-
1
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. ACM MobiCom, 2000, pp. 255-265.
-
(2000)
Proc. ACM MobiCom
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
2
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
J. Hubaux, L. Buttyan, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proc. ACM MobiHoc, 2001, pp. 146-155.
-
(2001)
Proc. ACM MobiHoc
, pp. 146-155
-
-
Hubaux, J.1
Buttyan, L.2
Capkun, S.3
-
3
-
-
0035704362
-
Providing robust and ubiquitous security support for MANET
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing robust and ubiquitous security support for MANET," in Proc. IEEE ICNP, 2001, pp. 251-260.
-
(2001)
Proc. IEEE ICNP
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
4
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proc. ACM MobiCom, 2002, pp. 12-23.
-
(2002)
Proc. ACM MobiCom
, pp. 12-23
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
5
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Jun.
-
Y. Hu, D. Johnson, and A. Perrig, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," in Proc. IEEE WMCSA, Jun. 2002, pp. 3-13.
-
(2002)
Proc. IEEE WMCSA
, pp. 3-13
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
6
-
-
0013138682
-
Secure routing for mobile ad hoc networks
-
P. Papadimitratos and Z. Haas, "Secure routing for mobile ad hoc networks," in Proc. CNDS, 2002, pp. 193-204.
-
(2002)
Proc. CNDS
, pp. 193-204
-
-
Papadimitratos, P.1
Haas, Z.2
-
7
-
-
84904904836
-
A secure protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Royer, "A secure protocol for ad hoc networks," in Proc. IEEE ICNP, 2002, pp. 78-89.
-
(2002)
Proc. IEEE ICNP
, pp. 78-89
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.3
Shields, C.4
Royer, E.5
-
8
-
-
0036980294
-
Securing ad hoc routing protocols
-
M. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proc. ACM WiSe, 2002, pp. 1-10.
-
(2002)
Proc. ACM WiSe
, pp. 1-10
-
-
Zapata, M.1
Asokan, N.2
-
9
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Jan.
-
S. Capkun, L. Buttyan, and J. Hubaux, "Self-organized public-key management for mobile ad hoc networks," IEEE Trans. Mobile Comput., vol. 2, no. 1, pp. 52-64, Jan. 2003.
-
(2003)
IEEE Trans. Mobile Comput.
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.3
-
10
-
-
0013046226
-
-
Reading, MA: Addison-Wesley, ch. 5
-
D. Johnson, D. Maltz, and J. Jetcheva, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Network, Ad Hoc Networking. Reading, MA: Addison-Wesley, 2001, ch. 5.
-
(2001)
DSR: The Dynamic Source Routing Protocol for Multi-hop Wireless Ad Hoc Network, Ad Hoc Networking
-
-
Johnson, D.1
Maltz, D.2
Jetcheva, J.3
-
11
-
-
34347349933
-
Ad hoc on-demand distance vector routing
-
C. Perkins and E. Royer, "Ad hoc on-demand distance vector routing," in Proc. IEEE WMCSA, 1999, pp. 90-100.
-
(1999)
Proc. IEEE WMCSA
, pp. 90-100
-
-
Perkins, C.1
Royer, E.2
-
12
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
J. Broch, D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva, "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proc. ACM MobiCom, 1998, pp. 85-97.
-
(1998)
Proc. ACM MobiCom
, pp. 85-97
-
-
Broch, J.1
Maltz, D.2
Johnson, D.3
Hu, Y.4
Jetcheva, J.5
-
13
-
-
0013094264
-
Ad hoc on demand distance vector (AODV) Routin
-
draft-ietf-manet-aodv-10.txt
-
C. Perkins, E. Royer, and S. Das, "Ad hoc on demand distance vector (AODV) Routin," Internet Draft, draft-ietf-manet-aodv-10.txt, 2002.
-
(2002)
Internet Draft
-
-
Perkins, C.1
Royer, E.2
Das, S.3
-
14
-
-
0033892676
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
S. Das, C. Perkins, and E. Royer, "Performance comparison of two on-demand routing protocols for ad hoc networks," in Proc. IEEE INFOCOM, 2003, pp. 3-12.
-
(2003)
Proc. IEEE INFOCOM
, pp. 3-12
-
-
Das, S.1
Perkins, C.2
Royer, E.3
-
16
-
-
21844480681
-
Link- Level measurements from an 802.11b mesh network
-
D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris, "Link- level measurements from an 802.11b mesh network," in Proc. ACM SIGCOMM, 2004, pp. 121-132.
-
(2004)
Proc. ACM SIGCOMM
, pp. 121-132
-
-
Aguayo, D.1
Bicket, J.2
Biswas, S.3
Judd, G.4
Morris, R.5
-
17
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," in Proc. IEEE INFOCOM, 2003, pp. 1976-1986.
-
(2003)
Proc. IEEE INFOCOM
, pp. 1976-1986
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
18
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
A. Perrig, R. Canetti, D. Song, and J. Tygar, "Efficient and secure source authentication for multicast," in Proc. NDSS, 2001, pp. 35-46.
-
(2001)
Proc. NDSS
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.4
-
19
-
-
0242527340
-
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
-
N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, "A charging and rewarding scheme for packet forwarding in multi-hop cellular networks," in Proc. ACM MobiHoc, 2003, pp. 13-24.
-
(2003)
Proc. ACM MobiHoc
, pp. 13-24
-
-
Salem, N.1
Buttyan, L.2
Hubaux, J.3
Jakobsson, M.4
-
20
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
Oct.
-
L. Buttyan and J. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," ACM/Kluwer Mobile Netw. Applicat., vol. 8, no. 5, pp. 579-592, Oct. 2003.
-
(2003)
ACM/Kluwer Mobile Netw. Applicat.
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.2
-
21
-
-
1542299118
-
Ad hoc-VCG: A truthful and cost- Efficient routing protocol for mobile ad hoc networks with selfish agents
-
S. Eidenbenz and L. Anderegg, "Ad hoc-VCG: A truthful and cost- efficient routing protocol for mobile ad hoc networks with selfish agents, " in Proc. ACM MobiCom, 2003, pp. 245-259.
-
(2003)
Proc. ACM MobiCom
, pp. 245-259
-
-
Eidenbenz, S.1
Anderegg, L.2
-
22
-
-
1542360013
-
Detection and handling of MAC layer misbehavior in wireless networks
-
Jun.
-
P. Kyasanur and N. Vaidya, "Detection and handling of MAC layer misbehavior in wireless networks," in Proc. IEEE DSN, Jun. 2003, pp. 173-182.
-
(2003)
Proc. IEEE DSN
, pp. 173-182
-
-
Kyasanur, P.1
Vaidya, N.2
-
23
-
-
0042014530
-
Random waypoint considered harmful
-
J. Yoon, M. Liu, and B. Noble, "Random waypoint considered harmful," in Proc. IEEE INFOCOM, 2003, pp. 1312-1321.
-
(2003)
Proc. IEEE INFOCOM
, pp. 1312-1321
-
-
Yoon, J.1
Liu, M.2
Noble, B.3
-
24
-
-
85031307530
-
Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
-
C. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," in Proc. ACM SIGCOMM, 1994, pp. 234-244.
-
(1994)
Proc. ACM SIGCOMM
, pp. 234-244
-
-
Perkins, C.1
Bhagwat, P.2
-
25
-
-
84947273682
-
The Sybil attack
-
J. Douceur, "The Sybil attack," in Proc. IPTPS, 2002, pp. 251-260.
-
(2002)
Proc. IPTPS
, pp. 251-260
-
-
Douceur, J.1
-
26
-
-
0242527339
-
Mobility helps security in ad hoc networks
-
S. Capkun, J. Hubaux, and L. Buttyan, "Mobility helps security in ad hoc networks," in Proc ACM MobiHoc, 2003, pp. 46-56.
-
(2003)
Proc ACM MobiHoc
, pp. 46-56
-
-
Capkun, S.1
Hubaux, J.2
Buttyan, L.3
-
28
-
-
0034546898
-
Intrusion detection in wireless ad hoc networks
-
Y. Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks," in Proc. ACM MOBICOM, 2000, pp. 275-283.
-
(2000)
Proc. ACM MOBICOM
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
|