A study of different types of attacks on multicast in mobile ad hoc networks
暂无分享,去创建一个
[1] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[2] Jorjeta G. Jetcheva,et al. Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks , 2001, MobiHoc '01.
[3] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[4] Reza Curtmola,et al. Mitigating Byzantine Attacks in Ad Hoc Wireless Networks , 2004 .
[5] C. Siva Ram Murthy,et al. A dynamic core based multicast routing protocol for ad hoc wireless networks , 2002, MobiHoc '02.
[6] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[7] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[8] J. J. Garcia-Luna-Aceves,et al. The core-assisted mesh protocol , 1999, IEEE J. Sel. Areas Commun..
[9] Lixia Zhang,et al. Forwarding Group Multicast Protocol (FGMP) for multihop, mobile wireless networks , 1998, Cluster Computing.
[10] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[11] Tatsuya Suda,et al. Bandwidth-efficient multicast routing protocol for ad-hoc networks , 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370).
[12] Chang-Jin Suh,et al. On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks , 2002, Mob. Networks Appl..
[13] T. Rappaport,et al. Effects of radio propagation path loss on DS-CDMA cellular frequency reuse efficiency for the reverse channel , 1992 .
[14] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[15] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[16] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[17] Tomasz Imielinski,et al. Mobile Computing , 1996 .
[18] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[19] Charles E. Perkins,et al. Multicast operation of the ad-hoc on-demand distance vector routing protocol , 1999, MobiCom.
[20] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[21] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[22] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[23] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[24] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[25] Chong-kwon Kim,et al. Neighbor supporting ad hoc multicast routing protocol , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).