-
2
-
-
0003597247
-
-
IETF Internet Draft, draft-ietf-manet-dsr-09, April
-
D. B. Johnson, D. A. Maltz, and Y-C. Hu, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)," IETF Internet Draft, draft-ietf-manet-dsr-09, April 2003.
-
(2003)
The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.-C.3
-
4
-
-
7244251119
-
-
IETF Internet Draft, draft-ietf-manet-tbrpf-07.txt, March
-
R. Ogier, M. Lewis, and F. Templin, "Topology Dissemination Based on Reverse-Path Forwarding (TBRPF)," IETF Internet Draft, draft-ietf-manet-tbrpf-07.txt, March 2003.
-
(2003)
Topology Dissemination Based on Reverse-Path Forwarding (TBRPF)
-
-
Ogier, R.1
Lewis, M.2
Templin, F.3
-
5
-
-
84904904836
-
A Secure Routing Protocol for Ad Hoc Networks
-
November
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. BeldingRoyer, "A Secure Routing Protocol for Ad Hoc Networks," In Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP), November 2002.
-
(2002)
Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
BeldingRoyer, E.M.5
-
6
-
-
0004118152
-
-
Proceedings of the MobiCom, Atlanta, Georgia, USA, September 23-28
-
Y-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks," in Proceedings of the MobiCom 2002, Atlanta, Georgia, USA, September 23-28, 2002.
-
(2002)
Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
7
-
-
2442582716
-
Secure Ad hoc On-Demand Distance Vector Routing
-
July
-
M. G. Zapata, "Secure Ad hoc On-Demand Distance Vector Routing," ACM Mobile Computing and Communications Review (MC2R), Vol. 6, No. 3, pp. 106-107, July 2002.
-
(2002)
ACM Mobile Computing and Communications Review (MC2R)
, vol.6
, Issue.3
, pp. 106-107
-
-
Zapata, M.G.1
-
8
-
-
84961572484
-
-
Y-C. Hu, D. B. Johnson, and A. Perrig SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, in Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), pp. 3-13, IEEE, Calicoon, NY, June 2002.
-
Y-C. Hu, D. B. Johnson, and A. Perrig "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," in Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), pp. 3-13, IEEE, Calicoon, NY, June 2002.
-
-
-
-
9
-
-
0242678584
-
Self-organized public-key Management for mobile ad hoc networks
-
January-March
-
S. Capkun, L. Nuttyan, and J. Hubaux, "Self-organized public-key Management for mobile ad hoc networks," IEEE Transactions on mobile computing, Vol. 2, No. 1, January-March, 2003.
-
(2003)
IEEE Transactions on mobile computing
, vol.2
, Issue.1
-
-
Capkun, S.1
Nuttyan, L.2
Hubaux, J.3
-
11
-
-
84866985446
-
Securing the OLSR protocol
-
Tunisia, June 25
-
C. Adjih, Th. Clausen, Ph. Jacquet, A. Laouiti, P. Muhlethaler, and D. Raffo, "Securing the OLSR protocol," In Proceedings of Med-Hoc-Net, Mahdia, Tunisia, June 25, 2003.
-
(2003)
Proceedings of Med-Hoc-Net, Mahdia
-
-
Adjih, C.1
Clausen, T.2
Jacquet, P.3
Laouiti, A.4
Muhlethaler, P.5
Raffo, D.6
-
12
-
-
4544296236
-
Implementing a Fully Distributed Certificate Authority in an OLSR MANET
-
Atlanta, Georgia USA, March 21-25
-
D. Dhillon, T.S. Randhawa, M. Wang and L. Lamont, "Implementing a Fully Distributed Certificate Authority in an OLSR MANET," IEEE WCNC2004, Atlanta, Georgia USA, March 21-25, 2004.
-
(2004)
IEEE WCNC2004
-
-
Dhillon, D.1
Randhawa, T.S.2
Wang, M.3
Lamont, L.4
-
13
-
-
14844323027
-
An Advanced Signature System for OLSR
-
Washington, DC, USA, October 25
-
D. Raffo, C. Adjih, T. Clausen, and P. Muhlethaler, "An Advanced Signature System for OLSR," in Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 04), Washington, DC, USA, October 25 2004.
-
(2004)
Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 04)
-
-
Raffo, D.1
Adjih, C.2
Clausen, T.3
Muhlethaler, P.4
-
14
-
-
34247520820
-
Attacks Against OLSR: Distributed Key Management for Security
-
Palaiseau, France, July 28-29
-
C. Adjih, D. Raffo, and P. Muhlethaler, "Attacks Against OLSR: Distributed Key Management for Security," 2nd OLSR Interop/ Workshop, Palaiseau, France, July 28-29, 2005.
-
(2005)
2nd OLSR Interop/ Workshop
-
-
Adjih, C.1
Raffo, D.2
Muhlethaler, P.3
-
15
-
-
12244259569
-
How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
-
Tech. Rep. TR-2003-07, North Carolina State University, Department of Computer Science, February
-
P. Ning, and K. Sun, "How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols," Tech. Rep. TR-2003-07, North Carolina State University, Department of Computer Science, February 2003.
-
(2003)
-
-
Ning, P.1
Sun, K.2
-
16
-
-
1542317831
-
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
-
San Diego, California, U.S.A, September 19
-
Y-C. Hu, A. Perrig, and D. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," ACM Workshop on Wireless Security (WiSe 2003) Westin Horton Plaza Hotel, San Diego, California, U.S.A, September 19, 2003.
-
(2003)
ACM Workshop on Wireless Security (WiSe 2003) Westin Horton Plaza Hotel
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
17
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
INFOCOM, pp
-
Y-C. Hu, A. Perrig, and D. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp.1976-1986, 2003.
-
(2003)
Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies
, pp. 1976-1986
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
18
-
-
3142667878
-
A New Set of Passive Routing Attacks in Mobile Ad Hoc Networks
-
Boston, MA, October 13-16
-
X. Hong, J. Kong, and M. Gerla, "A New Set of Passive Routing Attacks in Mobile Ad Hoc Networks," in Proceedings of IEEE Military Communications Conference (MILCOM'03), Boston, MA, October 13-16, 2003.
-
(2003)
Proceedings of IEEE Military Communications Conference (MILCOM'03)
-
-
Hong, X.1
Kong, J.2
Gerla, M.3
-
19
-
-
33749048761
-
An Effective Intrusion Detection Approach for OLSR MANET Protocol
-
NPSec, Boston, Massachusetts, USA, November 6
-
M. Wang, L. Lamont, P Mason, M. Gorlatova, "An Effective Intrusion Detection Approach for OLSR MANET Protocol", First Workshop on Secure Network Protocols (NPSec), Boston, Massachusetts, USA, November 6, 2005.
-
(2005)
First Workshop on Secure Network Protocols
-
-
Wang, M.1
Lamont, L.2
Mason, P.3
Gorlatova, M.4
-
20
-
-
0003403663
-
The Network Simulator - ns-2
-
The Vint Project, see http
-
The Vint Project, "The Network Simulator - ns-2," see http://www.isi.edu/nsnam/ns/index.html/.
-
-
-
-
21
-
-
34547308166
-
-
F. J. Ro, UM-OLSR Documentation, University of Murcia, March 2005, see http://masimum.dif.um.es/um-olsr/html/.
-
F. J. Ro, "UM-OLSR Documentation," University of Murcia, March 2005, see http://masimum.dif.um.es/um-olsr/html/.
-
-
-
-
22
-
-
3042802118
-
The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks
-
July/september
-
C. Bettstetter, G. Resta, and P. santi, "The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks," IEEE Transanction on Mobile Computing, Vol.2, No. 3, pp. 257-269, July/september, 2003.
-
(2003)
IEEE Transanction on Mobile Computing
, vol.2
, Issue.3
, pp. 257-269
-
-
Bettstetter, C.1
Resta, G.2
santi, P.3
|