A Case Study on Mobile Adhoc Network Security for Hostile Environment
暂无分享,去创建一个
[1] Om Prakash Vyas,et al. Performance of Routing Protocols for Mobile Adhoc and Wireless Sensor Networks: A Comparative Study , 2009 .
[2] Kamanashis Biswas,et al. Security Threats in Mobile Ad Hoc Network , 2007 .
[3] Hyuk Lim,et al. Secure Framework for Multipath Multimedia Streaming over Wireless Ad Hoc Network , 2009, 2009 IEEE Wireless Communications and Networking Conference.
[4] Muhammad Junaid,et al. Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol , 2007 .
[5] P. Chenna Reddy,et al. Performance Analysis of Adhoc Network Routing Protocols , 2006, 2006 International Symposium on Ad Hoc and Ubiquitous Computing.
[6] J. Kaiser,et al. Survey of mobile ad hoc network routing protocols , 2005 .
[7] R. B. Patel,et al. Mobile Ad hoc Networks: Challenges and Future , 2007 .
[8] K. H. Wandra,et al. Survey on Mobile Ad Hoc Network Routing Protocols , 2014 .
[9] V. R. Sarma Dhulipala,et al. Throughput and Delay Comparison of MANET Routing Protocols , 2009 .
[10] Nishu Garg,et al. MANET Security Issues , 2009 .
[11] Imrich Chlamtac,et al. Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.
[12] Stephen D. Wolthusen. Exploiting UAVs' Capabilities in Tactical MANETS , 2008 .
[13] Hung-Chin Jang,et al. Rescue information system for earthquake disasters based on MANET emergency communication platform , 2009, IWCMC.
[14] D Devi Aruna,et al. Layerwise security framework with snauthspmaodv to defend denial of service attack for mobile adhoc networks in hostile environment , 2012 .
[15] Luca Veltri,et al. SIP security issues: the SIP authentication procedure and its processing load , 2002, IEEE Netw..
[16] Girish Katkar,et al. Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.