-
1
-
-
0036804761
-
Routing Security in Wireless Ad Hoc Networks, University of Cincinnati
-
October
-
Hongmei Deng, Wei Li, and Dharma P. Agarwal, "Routing Security in Wireless Ad Hoc Networks", University of Cincinnati, IEEE Communications magazine, Vol.40, no. 10, October 2002.
-
(2002)
IEEE Communications magazine
, vol.40
, Issue.10
-
-
Deng, H.1
Li, W.2
Agarwal, D.P.3
-
4
-
-
0033357103
-
-
Lidong zhou, Zygmunt J. Haas, Securing Ad Hoc Networks, IEEE network, special issue on network security, 13, no. 6, November/ December 1999.
-
Lidong zhou, Zygmunt J. Haas, "Securing Ad Hoc Networks", IEEE network, special issue on network security, Vol. 13, no. 6, November/ December 1999.
-
-
-
-
5
-
-
3042647758
-
-
Yi-Chun Hu, Adrian Perrig, A Survey of Secure Wireless Ad Hoc Routing, IEEE Security and Privacy, 1540-7993/04 /$20.00© 2004 IEEE, May/June 2004.
-
Yi-Chun Hu, Adrian Perrig, "A Survey of Secure Wireless Ad Hoc Routing", IEEE Security and Privacy, 1540-7993/04 /$20.00© 2004 IEEE, May/June 2004.
-
-
-
-
6
-
-
4143065848
-
Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Netwoks
-
Yih-Chun, Adrian Perrig, David B. Johnson, "Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Netwoks", sparrow.ece.cmu.edu /~adrian/ projects/secure-routing/ariadne.pdf, 2002.
-
(2002)
-
-
Yih-Chun, A.P.1
Johnson, D.B.2
-
7
-
-
78651524850
-
-
Mobile Ad Hoc Networking Working Group, Internet Draft, February
-
Charles E. Perkins, Elizabeth M. Belding-Royer, Samir R. Das, , Mobile Ad Hoc Networking Working Group, Internet Draft, February 2003.
-
(2003)
-
-
Perkins, C.E.1
Belding-Royer, E.M.2
Das, S.R.3
-
8
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Available on
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker Mitigating routing misbehavior in mobile ad hoc networks. In mobile Computing and Networking (MOBICOM), pages 255-265, 2000. Available on: citeseer.ist.psu.edu/marti00mitigating.html.
-
(2000)
In mobile Computing and Networking (MOBICOM)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
9
-
-
21644475986
-
A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do
-
Technical Report IC/2003/72, EPFL-DI-ICA, November, Available
-
S. Buchegger, C. Tissieres, and J. Y. Le Boudec. A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do. Technical Report IC/2003/72, EPFL-DI-ICA, November 2003. Available on:citeseer.ist.psu.edu/645200.html.
-
(2003)
-
-
Buchegger, S.1
Tissieres, C.2
Le Boudec, J.Y.3
-
10
-
-
15344340908
-
A robust reputation system for mobile adhoc networks
-
Technical Report IC/2003/50, EPFL-DI-ICA, July
-
S. Buchegger and J. Y. Le Boudec. A robust reputation system for mobile adhoc networks. Technical Report IC/2003/50, EPFL-DI-ICA, July 2003.
-
(2003)
-
-
Buchegger, S.1
Le Boudec, J.Y.2
-
11
-
-
71849087703
-
Preventing denial of service and selfishness in adhoc networks
-
Lausanne, Switzerland, June
-
P. Michiardi and R. Molva. Preventing denial of service and selfishness in adhoc networks. In Working Session on Security in Ad Hoc Networks, Lausanne, Switzerland, June 2002.
-
(2002)
Working Session on Security in Ad Hoc Networks
-
-
Michiardi, P.1
Molva, R.2
-
12
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Portorosz, Slovenia, September
-
P. Michiardi and R. Molva. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of The 6th IFIP Communications and Multimedia Security Conference, pages 107-121, Portorosz, Slovenia, September 2002.
-
(2002)
Proceedings of The 6th IFIP Communications and Multimedia Security Conference
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
15
-
-
0043097428
-
Routing Protocols in Wireless Ad-hoc Networks- A Simulation Study
-
Masters thesis in computer science and engineering, Lulia University of Technology, Stockholm
-
Tony Larsson, Nicklas Hedman, "Routing Protocols in Wireless Ad-hoc Networks- A Simulation Study", Masters thesis in computer science and engineering, Lulia University of Technology, Stockholm, 1998.
-
(1998)
-
-
Larsson, T.1
Hedman, N.2
-
16
-
-
78651533549
-
-
Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, WIRELESS/MOBILE NETWORK SECURITY, 2006 Springer.
-
Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks", WIRELESS/MOBILE NETWORK SECURITY, 2006 Springer.
-
-
-
-
17
-
-
78651572321
-
-
C.Siva Ram Murthy and B.S.Manoj, Ad hoc Wireless Networks-Architectures and Protocols, Pearson Education, 2007.
-
C.Siva Ram Murthy and B.S.Manoj," Ad hoc Wireless Networks-Architectures and Protocols", Pearson Education, 2007.
-
-
-
-
18
-
-
71849102863
-
-
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and Kendall Nygard, "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks", www.cs.ndsu.nodak.edu/~nygard/research / BlackHoleMANET.pdf 2003.
-
(2003)
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
-
-
Ramaswamy, S.1
Fu, H.2
Sreekantaradhya, M.3
Dixon, J.4
Nygard, K.5
-
20
-
-
51949111850
-
A Novel Security Agent Scheme for Aodv Routing Protocol Based on Thread State Transition. Asian
-
Chen Hongsong, Ji Zhenzhou and Hu Mingzeng, "A Novel Security Agent Scheme for Aodv Routing Protocol Based on Thread State Transition". Asian Journal of Information Technology, 5 (1): 54-60, 2006.
-
(2006)
Journal of Information Technology
, vol.5
, Issue.1
, pp. 54-60
-
-
Chen, H.1
Zhenzhou, J.2
Hu, M.3
|