-
6
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
Paris, France, November
-
Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer E. A secure routing protocol for ad hoc networks. Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP), Paris, France, November 2002.
-
(2002)
Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.5
-
7
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, Georgia, U.S.A, 23-28 September
-
Hu Y-C, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. Proceedings of the MobiCom 2002, Atlanta, Georgia, U.S.A., 23-28 September 2002.
-
(2002)
Proceedings of the MobiCom
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
9
-
-
0036980294
-
Securing ad-hoc routing protocols
-
Atlanta, GA, U.S.A, September
-
Zapata MG, Asokan N. Securing ad-hoc routing protocols. Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), Atlanta, GA, U.S.A., September 2002; 1-10.
-
(2002)
Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002)
, pp. 1-10
-
-
Zapata, M.G.1
Asokan, N.2
-
10
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
IEEE: Calicoon, NY, June
-
Hu Y-C, Johnson DB, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002). IEEE: Calicoon, NY, June 2002; 3-13.
-
(2002)
Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002)
, pp. 3-13
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
14
-
-
12244259569
-
How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
-
Technical Report TR-2003-07, North Carolina State University, Department of Computer Science
-
Ning P, Sun K. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Technical Report TR-2003-07, North Carolina State University, Department of Computer Science, 2003.
-
(2003)
-
-
Ning, P.1
Sun, K.2
-
15
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
San Diego, California, U.S.A, 19 September
-
Hu Y-C, Perrig A, Johnson D. Rushing attacks and defense in wireless ad hoc network routing protocols. ACM Workshop on Wireless Security (WiSe 2003), San Diego, California, U.S.A., 19 September 2003.
-
(2003)
ACM Workshop on Wireless Security (WiSe 2003)
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
16
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
San Francisco, CA, U.S.A
-
Hu Y-C, Perrig A, Johnson D. Packet leashes: a defense against wormhole attacks in wireless networks. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), San Francisco, CA, U.S.A., 2003; 1976-1986.
-
(2003)
Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)
, pp. 1976-1986
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
17
-
-
70450243327
-
On vulnerability and protection of ad hoc on-demand distance vector protocol
-
France, Paris
-
Wang BBW, Lu Y. On vulnerability and protection of ad hoc on-demand distance vector protocol. International Conference on Telecommunication, France, Paris, 2003.
-
(2003)
International Conference on Telecommunication
-
-
Wang, B.B.W.1
Lu, Y.2
-
18
-
-
34247465849
-
A new routing attack in mobile ad hoc networks
-
Yi P, Dai Zh, Zhang Sh, Zhong Y. A new routing attack in mobile ad hoc networks. International Journal of Information Technology 2005; 11(2):83-94.
-
(2005)
International Journal of Information Technology
, vol.11
, Issue.2
, pp. 83-94
-
-
Yi, P.1
Dai, Z.2
Zhang, S.3
Zhong, Y.4
-
19
-
-
24944490509
-
-
Desilva S, Boppana RV. Mitigating malicious control packet floods in ad hoc networks. Proceedings of IEEE Wireless Communication and Networking Conference, New Orleans, Lucian, U.S.A., 2005.
-
Desilva S, Boppana RV. Mitigating malicious control packet floods in ad hoc networks. Proceedings of IEEE Wireless Communication and Networking Conference, New Orleans, Lucian, U.S.A., 2005.
-
-
-
-
20
-
-
34548048170
-
Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method
-
in press
-
Kurosawa S, Nakayama H, Kato N, Nemoto Y, Jamalipour A. Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. International Journal of Network Security 2007, in press.
-
(2007)
International Journal of Network Security
-
-
Kurosawa, S.1
Nakayama, H.2
Kato, N.3
Nemoto, Y.4
Jamalipour, A.5
-
21
-
-
3142667878
-
A new set of passive routing attacks in mobile ad hoc networks
-
Boston, MA, 13-16 October
-
Hong X, Kong J, Gerla M. A new set of passive routing attacks in mobile ad hoc networks. Proceedings of IEEE Military Communications Conference (MILCOM'03), Boston, MA, 13-16 October 2003.
-
(2003)
Proceedings of IEEE Military Communications Conference (MILCOM'03)
-
-
Hong, X.1
Kong, J.2
Gerla, M.3
-
22
-
-
4544296236
-
Implementing a fully distributed certificate authority in an OLSR MANET
-
Atlanta, Georgia, U.S.A, 21-25 March
-
Dhillon D, Randhawa TS, Wang M, Lamont L. Implementing a fully distributed certificate authority in an OLSR MANET. IEEE WCNC2004, Atlanta, Georgia, U.S.A., 21-25 March 2004.
-
(2004)
IEEE WCNC2004
-
-
Dhillon, D.1
Randhawa, T.S.2
Wang, M.3
Lamont, L.4
-
23
-
-
34247520820
-
Attacks against OLSR: Distributed key management for security
-
Palaiseau, France, 28-29 July
-
Adjih C, Raffo D, Muhlethaler P. Attacks against OLSR: distributed key management for security. Second OLSR Interop/ Workshop, Palaiseau, France, 28-29 July 2005.
-
(2005)
Second OLSR Interop/ Workshop
-
-
Adjih, C.1
Raffo, D.2
Muhlethaler, P.3
-
24
-
-
14844323027
-
-
Raffo D, Adjih C, Clausen T, Muhlethaler P. An advanced signature system for OLSR. Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 04), Washington, DC, U.S.A., 25 Ocotber 2004.
-
Raffo D, Adjih C, Clausen T, Muhlethaler P. An advanced signature system for OLSR. Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 04), Washington, DC, U.S.A., 25 Ocotber 2004.
-
-
-
-
25
-
-
33749048761
-
An effective intrusion detection approach for OLSR MANET protocol
-
Boston, Massachusetts, U.S.A, 6 November
-
Wang M, Lamont L, Mason P, Gorlatova M. An effective intrusion detection approach for OLSR MANET protocol. First Workshop on Secure Network Protocols (NPSec), Boston, Massachusetts, U.S.A., 6 November 2005.
-
(2005)
First Workshop on Secure Network Protocols (NPSec)
-
-
Wang, M.1
Lamont, L.2
Mason, P.3
Gorlatova, M.4
-
27
-
-
36749051678
-
-
Ro FJ. UM-OLSR Documentation. University of Murcia, March 2005, see http://masimum.dif.um.es/um-olsr/html/
-
Ro FJ. UM-OLSR Documentation. University of Murcia, March 2005, see http://masimum.dif.um.es/um-olsr/html/
-
-
-
-
28
-
-
3042802118
-
The node distribution of the random waypoint mobility model for wireless ad hoc networks
-
Bettstetter C, Resta G, Santi P. The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Transaction on Mobile Computing 2003; 2(3):257-269.
-
(2003)
IEEE Transaction on Mobile Computing
, vol.2
, Issue.3
, pp. 257-269
-
-
Bettstetter, C.1
Resta, G.2
Santi, P.3
|