-
1
-
-
27844590384
-
A survey on wireless mesh networks
-
Sept.
-
I. F. Akyildiz and X. Wang, "A survey on wireless mesh networks," IEEE Commun. Mag., vol.43, no.9, pp. S23-S30, Sept. 2005.
-
(2005)
IEEE Commun. Mag.
, vol.43
, Issue.9
-
-
Akyildiz, I.F.1
Wang, X.2
-
2
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. International Conference on Mobile Computing and Networking, Boston, MA, 2000.
-
(2000)
Proc. International Conference on Mobile Computing and Networking
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
3
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Sept.
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Elsevier's AdHoc Networks J., vol.1, no.2-3, pp. 293-315, Sept. 2003.
-
(2003)
Elsevier's AdHoc Networks J.
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
4
-
-
34548852836
-
CHEMAS: Identify suspect nodes in selective forwarding attacks
-
Nov.
-
B. Xiao, B. Yu, and C. Gao, "CHEMAS: identify suspect nodes in selective forwarding attacks," J. Parallel and Distrib. Computing, vol.67, no.11, pp. 1218-1230, Nov. 2007.
-
(2007)
J. Parallel and Distrib. Computing
, vol.67
, Issue.11
, pp. 1218-1230
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
7
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
Summer
-
A. Perrig, R. Canetti, D. Tygar, and D Song, "The TESLA Broadcast Authentication Protocol," in RSA CryptoBytes, Summer 2002.
-
(2002)
RSA CryptoBytes
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
8
-
-
34447283779
-
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
-
Sept.
-
I. Khalil, S. Bagchi, and N. B. Shroff, "LiteWorp: detection and isolation of the wormhole attack in static multihop wireless networks," Computer Networks: The International J. Computer and Telecommun. Networking , vol.51, no.13, pp. 3750-3772, Sept. 2007.
-
(2007)
Computer Networks: The International J. Computer and Telecommun. Networking
, vol.51
, Issue.13
, pp. 3750-3772
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
10
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
July
-
Y. Hu, D. B. Johnson, and A. Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks," Ad Hoc Networks, vol.1, no.1, pp. 175-192, July 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.1
Johnson, D.B.2
Perrig, A.3
-
11
-
-
33846602719
-
Trust modeling and evaluation in ad hoc networks
-
Dec.
-
Y. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Trust modeling and evaluation in ad hoc networks," in Proc. IEEE GLOBECOM '05, vol.3, Dec. 2005.
-
(2005)
Proc. IEEE GLOBECOM '05
, vol.3
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
13
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
Apr.
-
Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu, "A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks," in Proc. INFOCOM, 2006, pp. 1-13, Apr. 2006.
-
(2006)
Proc. INFOCOM 2006
, pp. 1-13
-
-
Sun, Y.L.1
Han, Z.2
Yu, W.3
Liu, K.J.R.4
-
14
-
-
44049108171
-
Attacks on trust evaluation in distributed networks
-
Mar.
-
Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu, "Attacks on trust evaluation in distributed networks," in Proc. 40th Annual Conference on Information Sciences and Systems 2006, no.22-24, pp. 1461-1466, Mar. 2006.
-
(2006)
Proc. 40th Annual Conference on Information Sciences and Systems 2006
, Issue.22-24
, pp. 1461-1466
-
-
Sun, Y.L.1
Han, Z.2
Yu, W.3
Liu, K.J.R.4
-
15
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
Mar.
-
K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "Authenticated routing for ad hoc networks," IEEE J Sel. Areas Commun., vol.23, no.3, pp. 598-610, Mar. 2007.
-
(2007)
IEEE J Sel. Areas Commun.
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
Laflamme, D.2
Dahill, B.3
Levine, B.N.4
Shields, C.5
Belding-Royer, E.M.6
-
16
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y. Hu, D. B. Johnson, and A. Perrig, "Ariadne: a secure on-demand routing protocol for ad hoc networks," in Proc. Mobicom'02, pp. 12-23, 2002.
-
(2002)
Proc. Mobicom'02
, pp. 12-23
-
-
Hu, Y.1
Johnson, D.B.2
Perrig, A.3
-
17
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Y. Hu, D. B. Johnson, and A. Perrig, "Rushing attacks and defense in wireless ad hoc network routing protocols," in Proc. ACM Workshop on Wireless Security (WiSe), pp. 30-40, 2003.
-
(2003)
Proc. ACM Workshop on Wireless Security (WiSe)
, pp. 30-40
-
-
Hu, Y.1
Johnson, D.B.2
Perrig, A.3
-
18
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Mar.
-
Y. Hu, D. B. Johnson, and A. Perrig, "Packet leashes: a defense against wormhole attacks in wireless networks," in Proc. IEEE INFOCOM 2003, vol.3, pp. 1976-1986, Mar. 2003.
-
(2003)
Proc. IEEE INFOCOM 2003
, vol.3
, pp. 1976-1986
-
-
Hu, Y.1
Johnson, D.B.2
Perrig, A.3
-
20
-
-
39549084697
-
Routing metrics and protocols for wireless mesh networks
-
Jan.
-
M. E. M. Campista, D. G. Passos, P. M. Esposito, I. M. Moraes, C. V. N. de Albuquerque, D. C. M. Saade, M. G. Rubinstein, L. H. M. K. Costa, and O. C. M. B. Duarte, "Routing metrics and protocols for wireless mesh networks," IEEE Network, vol.22, no.1, pp. 612, Jan. 2008.
-
(2008)
IEEE Network
, vol.22
, Issue.1
, pp. 612
-
-
Campista, M.E.M.1
Passos, D.G.2
Esposito, P.M.3
Moraes, I.M.4
De Albuquerque, C.V.N.5
Saade, D.C.M.6
Rubinstein, M.G.7
Costa, L.H.M.K.8
Duarte, O.C.M.B.9
-
21
-
-
34249339428
-
Securing cooperative ad-hoc networks under noise and imperfect monitoring: Strategies and game theoretic analysis
-
June
-
W. Yu, Z. Ji, and K. J. R. Liu, "Securing cooperative ad-hoc networks under noise and imperfect monitoring: strategies and game theoretic analysis," IEEE Trans. Inf. Forensics and Security, vol.2, no.2, pp. 240-253, June 2007.
-
(2007)
IEEE Trans. Inf. Forensics and Security
, vol.2
, Issue.2
, pp. 240-253
-
-
Yu, W.1
Ji, Z.2
Liu, K.J.R.3
-
22
-
-
2442519150
-
Locationcentric isolation of misbehavior and trust routing in energy-constrained sensor networks
-
S. Tanachaiwiwat, P. Dave, R. Bhindwale, and A. Helmy, "Locationcentric isolation of misbehavior and trust routing in energy-constrained sensor networks," in Proc. IEEE IPCCC, pp. 463-469, 2004.
-
(2004)
Proc. IEEE IPCCC
, pp. 463-469
-
-
Tanachaiwiwat, S.1
Dave, P.2
Bhindwale, R.3
Helmy, A.4
-
23
-
-
24744432675
-
Self-policing mobile ad hoc networks by reputation systems
-
July
-
S. Buchegger and J. Y. Le Boudee, "Self-policing mobile ad hoc networks by reputation systems," IEEE Commun. Mag., vol.43, no.7, pp. 101-107, July 2005.
-
(2005)
IEEE Commun. Mag.
, vol.43
, Issue.7
, pp. 101-107
-
-
Buchegger, S.1
Le Boudee, J.Y.2
-
24
-
-
77951567609
-
Channel-aware detection of gray hole attacks in wireless mesh networks
-
submitted
-
D. Manikantan Shila, Y. Cheng, and T. Anjali, "Channel-aware detection of gray hole attacks in wireless mesh networks," in Proc. GLOBECOM, 2009, submitted.
-
(2009)
Proc. GLOBECOM
-
-
Manikantan Shila, D.1
Cheng, Y.2
Anjali, T.3
-
25
-
-
0000266745
-
Shared generation of authentication and signatures
-
Berlin
-
Y. Desmedt and Y. Frankel, "Shared generation of authentication and signatures," Advances in Cryptology (CRYPTO'91), Berlin, pp. 457-469, 1991.
-
(1991)
Advances in Cryptology (CRYPTO'91)
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
26
-
-
3042785862
-
Sybil attack in sensor networks: Analysis and defenses
-
New York
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "Sybil attack in sensor networks: analysis and defenses," in Proc. IPSN '04, New York, pp. 259-268, 2004.
-
(2004)
Proc. IPSN '04
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
28
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
B. Parno, A. Perrig, and V. D. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proc. IEEE Symposium on Security and Privacy, 2004, pp. 49-63.
-
(2004)
Proc. IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.D.3
-
29
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
Anchorage, AK, May
-
L. Mingyan, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks," in Proc. IEEE INFOCOM 2007, pp. 1307-1315, Anchorage, AK, May 2007.
-
(2007)
Proc. IEEE INFOCOM 2007
, pp. 1307-1315
-
-
Mingyan, L.1
Koutsopoulos, I.2
Poovendran, R.3
-
30
-
-
34848842164
-
Catching " moles" in sensor networks,"
-
Toronto, Canada, June
-
Y. Fan, Y. Hao, and L. Zhen, "Catching "moles" in sensor networks," in Proc. International Conference on Distributed Computing Systems, Toronto, Canada, June 2007.
-
(2007)
Proc. International Conference on Distributed Computing Systems
-
-
Fan, Y.1
Hao, Y.2
Zhen, L.3
-
31
-
-
34547484913
-
Achieving privacy in mesh networks
-
Oct. , Alexandria, VA, USA
-
X. Wu and N. Li, "Achieving privacy in mesh networks," in Proc. Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, Oct. 2006, Alexandria, VA, USA.
-
(2006)
Proc. Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks
-
-
Wu, X.1
Li, N.2
-
32
-
-
77952282266
-
Secure remote management and software distribution for wireless mesh networks
-
Santander, Spain, May
-
T. Staub, D. Balsiger, M. Lustenberger, and T. Braun, "Secure remote management and software distribution for wireless mesh networks," in Proc. ASWN, Santander, Spain, May 2007, pp. 4754.
-
(2007)
Proc. ASWN
, pp. 4754
-
-
Staub, T.1
Balsiger, D.2
Lustenberger, M.3
Braun, T.4
-
33
-
-
0142002511
-
The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
Aug.
-
D. Johnson, A. Menezes, and S. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)," International J. Inf. Security, vol.1, no.1, pp. 36-63, Aug. 2001.
-
(2001)
International J. Inf. Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
34
-
-
50049106991
-
Adaptive FECbased packet loss resilience scheme for supporting voice communication over ad hoc wireless networks
-
V. R. Gandikota, B. R Tamma, and C. S. R. Murthy, "Adaptive FECbased packet loss resilience scheme for supporting voice communication over ad hoc wireless networks," IEEE Trans. Mobile Comput., vol.7, no.10, pp. 1184-1199, 2008.
-
(2008)
IEEE Trans. Mobile Comput.
, vol.7
, Issue.10
, pp. 1184-1199
-
-
Gandikota, V.R.1
Tamma, B.R.2
Murthy, C.S.R.3
-
35
-
-
0842311059
-
Sensitivity of wireless network simulations to a two-state Markov model channel approximation
-
Dec.
-
S. Miller and J. McDougall, "Sensitivity of wireless network simulations to a two-state Markov model channel approximation," in Proc. IEEE GLOBECOM, vol.2, no.1, pp. 697-701, Dec. 2003.
-
(2003)
Proc. IEEE GLOBECOM
, vol.2
, Issue.1
, pp. 697-701
-
-
Miller, S.1
McDougall, J.2
-
37
-
-
29144503071
-
How well can the IEEE 802.11 wireless LAN support quality of service?
-
Nov.
-
H. Zhai, X. Chen, and Y. Fang, "How well can the IEEE 802.11 wireless LAN support quality of service?" IEEE Trans. Wireless Commun., vol.4, no.6, pp. 3084-3094, Nov. 2005.
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, Issue.6
, pp. 3084-3094
-
-
Zhai, H.1
Chen, X.2
Fang, Y.3
-
38
-
-
0033749075
-
Performance analysis of the IEEE 802.11 distributed coordination function
-
Mar.
-
G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordination function," IEEE J. Sel. Areas Commun., vol.18, no.3, pp. 535-547, Mar. 2000.
-
(2000)
IEEE J. Sel. Areas Commun.
, vol.18
, Issue.3
, pp. 535-547
-
-
Bianchi, G.1
-
42
-
-
0004194997
-
-
UC Berkely, LBL, USC/ISI, and Xerox PARC
-
K. Fall and K. Varadhan, NS notes and documentation, The VINT Project, UC Berkely, LBL, USC/ISI, and Xerox PARC, 1997.
-
(1997)
NS Notes and Documentation, the VINT Project
-
-
Fall, K.1
Varadhan, K.2
-
44
-
-
70450252084
-
On TCP throughput and window size in a multihop wireless network testbed
-
Sep., Montral, Quebec, Canada
-
D. Koutsonikolas, J. Dyaberi, P. Garimella, S. Fahmy, and Y. C. Hu, "On TCP throughput and window size in a multihop wireless network testbed," in Proc. WiNTECH07, Sep. 2007, Montral, Quebec, Canada.
-
(2007)
Proc. WiNTECH07
-
-
Koutsonikolas, D.1
Dyaberi, J.2
Garimella, P.3
Fahmy, S.4
Hu, Y.C.5
-
45
-
-
0013094925
-
-
Ph.D. thesis, Carnegie Mellon University, Pittsburgh, PA, May
-
D. A. Maltz, "On-demand routing in multi-hop wireless mobile ad hoc networks," Ph.D. thesis, Carnegie Mellon University, Pittsburgh, PA, May 2001.
-
(2001)
On-demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks
-
-
Maltz, D.A.1
|