-
1
-
-
0027693935
-
Diversity coding for transparent self-healing and fault-tolerant communication networks
-
Ayanoglu E., I C., Gitlin R., and Mazo J. Diversity coding for transparent self-healing and fault-tolerant communication networks. IEEE Trans Commun 41 (1993) 1677-1686
-
(1993)
IEEE Trans Commun
, vol.41
, pp. 1677-1686
-
-
Ayanoglu, E.1
I, C.2
Gitlin, R.3
Mazo, J.4
-
2
-
-
4544259841
-
-
Capkun S, Buttyan L, Hubaux J. SECTOR: secure tracking of node encounters in multi-hop wireless networks. ACM workshop on security of ad hoc and sensor networks (SASN), Washington, DC, USA; October 2003. p. 1-12.
-
-
-
-
3
-
-
3543123509
-
STREAM: sensor topology retrieval at multiple resolutions
-
Deb B., Bhatnagar S., and Nath B. STREAM: sensor topology retrieval at multiple resolutions. Telecommun Syst 26 (2004) 285-320
-
(2004)
Telecommun Syst
, vol.26
, pp. 285-320
-
-
Deb, B.1
Bhatnagar, S.2
Nath, B.3
-
4
-
-
0035017228
-
-
Grossglauser M, Tse D. Mobility increases the capacity of ad-hoc wireless networks. Proceedings of IEEE INFOCOM; April 2001. p. 1360-9.
-
-
-
-
5
-
-
33750581662
-
-
Hu L, Evans D. Using directional antennas to prevent wormhole attacks. Network and distributed system security symposium (NDSS), San Diego; February 2004.
-
-
-
-
6
-
-
85177501976
-
-
Hu Y, Johnson D. Caching strategies in on-demand routing protocols for wireless ad hoc networks. Proceedings of MobiCom; August 2000. p. 231-42.
-
-
-
-
7
-
-
84961572484
-
-
Hu Y, Johnson DB, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Proceedings of the 4th IEEE workshop on mobile computing systems & applications (WMCSA 2002), IEEE, Calicoon, NY; June 2002a. p. 3-13.
-
-
-
-
8
-
-
85177210833
-
-
Hu Y, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. MobiCom 2002, Atlanta, GA; September 2002b. p. 12-23.
-
-
-
-
9
-
-
0041973497
-
-
Hu Y-C, Perrig A, Johnson DB. Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. Proceedings of INFOCOM 2003; April 2003a. p. 1976-86.
-
-
-
-
10
-
-
1542317831
-
-
Hu Y-C, Perrig A, Johnson DB. Rushing attacks and defense in wireless ad hoc network routing protocols. ACM workshop on wireless security (WiSe 2003), Westin Horton Plaza Hotel, San Diego, CA; September 2003b. p. 30-40.
-
-
-
-
11
-
-
33750578378
-
-
Johnson D, Maltz D, Hu Y. The dynamic source routing protocol for mobile ad hoc networks. Internet draft, draft-ietf-manet-dsr-09.txt, April 2003.
-
-
-
-
12
-
-
0034844688
-
-
Lee S, Gerla M. Split multipath routing with maximally disjoint paths in ad hoc networks. Proceedings of IEEE ICC, vol. 10; May 2001. p. 3201-5.
-
-
-
-
13
-
-
33750576068
-
-
Marina MK, Das SR. Ad hoc on-demand multipath distance vector routing protocol. Proceedings of IEEE ICNP; November 2001.
-
-
-
-
14
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
Mishra A., Nadkarni K., and Patcha A. Intrusion detection in wireless ad hoc networks. IEEE Wireless Commun 11 1 (2004) 48-60
-
(2004)
IEEE Wireless Commun
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
15
-
-
84944881532
-
-
Nasipuri A, Das SR. On-demand multipath routing for mobile ad hoc networks. Proceedings of the 8th international conference on computer communications and networks (IC3N), Boston, MA; 1999.
-
-
-
-
16
-
-
33750602325
-
-
Papadimitratos P, Haas ZJ. Secure routing for mobile ad hoc networks. SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), San Antonio, TX; January 2002.
-
-
-
-
17
-
-
84944714533
-
-
Patcha A, Mishra A. Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. Proceedings of RAWCON '03; 2003. p. 75-8.
-
-
-
-
18
-
-
33750596144
-
-
Perkins C, Belding-Royer E, Das S. Ad hoc on-demand distance vector (AODV) routing. RFC 3561; July 2003.
-
-
-
-
19
-
-
0042976106
-
-
Pham P, Perreau S. Performance analysis of reactive shortest path and multi-path routing mechanism with load balance. Proceedings of INFOCOM 2003; 2003. p. 251-9.
-
-
-
-
20
-
-
84904904836
-
-
Sanzgiri K, Dahill B, Levine B, Shields C, Belding-Royer E. A secure routing protocol for ad hoc networks. Proceedings of the 10th IEEE international conference on network protocols (ICNP'02), Paris, France; November 2002. p. 78-87.
-
-
-
-
21
-
-
2342588224
-
Analysis of multipath routing-part I: the effect on the packet delivery ratio
-
Tsirigos A., and Haas Z.J. Analysis of multipath routing-part I: the effect on the packet delivery ratio. IEEE Trans Wireless Commun 3 1 (2004) 138-146
-
(2004)
IEEE Trans Wireless Commun
, vol.3
, Issue.1
, pp. 138-146
-
-
Tsirigos, A.1
Haas, Z.J.2
-
22
-
-
2342625273
-
Analysis of multipath routing-part II: mitigation of the effects of frequently changing network topologies
-
Tsirigos A., and Haas Z.J. Analysis of multipath routing-part II: mitigation of the effects of frequently changing network topologies. IEEE Trans Wireless Commun 3 2 (2004) 500-511
-
(2004)
IEEE Trans Wireless Commun
, vol.3
, Issue.2
, pp. 500-511
-
-
Tsirigos, A.1
Haas, Z.J.2
-
23
-
-
33750592595
-
-
Vasudevan R, Sanyal S. A novel multipath approach to security in mobile ad hoc networks (MANETs). Proceedings of the international conference on computers and devices for communication (CODEC'04), Kolkata, India; January 2004.
-
-
-
-
24
-
-
11244309139
-
-
Wang W, Bhargava B. Visualization of wormholes in sensor networks. ACM Workshop on Wireless Security (WiSe 2004), Philadelphia, PA; October 2004. p. 51-60.
-
-
-
-
25
-
-
33750586162
-
-
Wang W, Bhargava B, Lu Y, Wu X. Defending against wormhole attacks in mobile ad hoc networks. Preprint, http://www.cs.purdue.edu/homes/wangwc/papers/MC2R_sample_101104.pdf
-
-
-
-
26
-
-
33750576544
-
-
Zapata M. Secure ad hoc on-demand distance vector routing. ACM mobile computing and communications review (MC2R), vol. 6(3); July 2002, p. 106-7.
-
-
-
-
27
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Zhang Y., Lee W., and Huang Y. Intrusion detection techniques for mobile wireless networks. Wireless Networks 9 5 (2003) 545-556
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
28
-
-
0142187757
-
-
Zhen J, Srinivas S. Preventing replay attacks for secure routing in ad hoc networks. ADHOC-NOW 2003, Lecture Notes in Computer Science, vol. 2865; 2003. p. 140-50.
-
-
-
|