A secure method on a routing protocol for ad hoc networks
暂无分享,去创建一个
[1] Levente Buttyán,et al. Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.
[2] Levente Buttyán,et al. Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks , 2005, ESAS.
[3] Levente Buttyán,et al. Towards provable security for ad hoc routing protocols , 2004, SASN '04.
[4] Yang Lu,et al. Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar Traffic , 2007 .
[5] Mike Burmester,et al. On the Security of Route Discovery in MANETs , 2009, IEEE Transactions on Mobile Computing.
[6] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[7] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[8] Wenchao Huang,et al. DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation , 2009, 2009 International Conference on Computational Science and Engineering.
[9] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[10] Pla Uni,et al. Secure Routing for Mobile Ad hoc Networks , 2005 .
[11] Chu-Hsing Lin,et al. Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[12] Rajendra V. Boppana,et al. Crosscheck mechanism to identify malicious nodes in ad hoc networks , 2009, Secur. Commun. Networks.