-
1
-
-
47249090887
-
AntSec, WatchAnt and AntRep: Innovative security mechanisms for wireless mesh networks
-
In.
-
Mogre P, Graffi K, Hollick M, Steinmetz R,. AntSec, WatchAnt and AntRep: innovative security mechanisms for wireless mesh networks. In IEEE LCN 07: Local Computer Networks 2007, 2007.
-
(2007)
IEEE LCN 07: Local Computer Networks 2007
-
-
Mogre, P.1
Graffi, K.2
Hollick, M.3
Steinmetz, R.4
-
3
-
-
13844296355
-
Wireless mesh networks: A survey
-
DOI 10.1016/j.comnet.2004.12.001, PII S1389128604003457
-
Akyildiz I, Wang X, Wang W,. Wireless mesh networks: a survey. Computer Networks 2005; 47 (2): 445-487. (Pubitemid 40242422)
-
(2005)
Computer Networks
, vol.47
, Issue.4
, pp. 445-487
-
-
Akyildiz, I.F.1
Wang, X.2
Wang, W.3
-
4
-
-
34748889998
-
The IEEE 802.16-2004 MESH Mode Explained
-
Technical Report KOM-TR-2006-08, Dec.
-
Mogre P, Hollick M, Steinmetz R,. The IEEE 802.16-2004 MESH Mode Explained. Multimedia Communications Lab, Technische Universität Darmstadt, Technical Report KOM-TR-2006-08, Dec 2006.
-
(2006)
Multimedia Communications Lab, Technische Universität Darmstadt
-
-
Mogre, P.1
Hollick, M.2
Steinmetz, R.3
-
6
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
In, 2000, pp.
-
Marti S, Giuli T, Lai K, Baker M,. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Sixth Annual International Conference on Mobile Computing and Networking, 2000, pp. 255-265.
-
Sixth Annual International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
7
-
-
0004118142
-
-
Imielinski T., Korth H. (eds). Kluwer Academic Publishers: Dordrecht, The Netherlands.
-
Johnson D, Maltz D,. Dynamic source routing in ad hoc wireless networks. In Mobile Computing, Imielinski T, Korth H, (eds). Kluwer Academic Publishers: Dordrecht, The Netherlands, 1996.
-
(1996)
Dynamic Source Routing in Ad Hoc Wireless Networks. in Mobile Computing
-
-
Johnson, D.1
Maltz, D.2
-
9
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
Djenouri D, Khelladi L, Badache AN,. A survey of security issues in mobile ad hoc and sensor networks, Communications Surveys & Tutorials, IEEE 2005; 7 (4): 2-28.
-
(2005)
Communications Surveys & Tutorials, IEEE
, vol.7
, Issue.4
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, A.N.3
-
10
-
-
37349030709
-
Security issues in wireless mesh networks
-
DOI 10.1109/MUE.2007.187, 4197357, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
-
Siddiqui MS, C. S. v. Security issues in wireless mesh networks. International Conference on Multimedia and Ubiquitous Engineering, vol. 0, 2007; pp. 717-722. (Pubitemid 350301565)
-
(2007)
Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
, pp. 717-722
-
-
Siddiqui, M.S.1
Choong, S.H.2
-
13
-
-
0842283101
-
A Secure Routing Protocol for Ad Hoc Networks
-
Paris, France, Nov
-
Sanzgiri K, Dahill B, Levine B, Belding-Royer E,. A Secure Routing Protocol for Ad Hoc Networks. International Conference on Network Protocols (ICNP), Paris, France, Nov. 2002.
-
(2002)
International Conference on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.3
Belding-Royer, E.4
-
15
-
-
0242426103
-
The TESLA Broadcast Authentication Protocol
-
In, vol., no. 2. RSA Laboratories, pp.
-
Perrig A, Canetti R, Tygar D, Song D,. The TESLA Broadcast Authentication Protocol. In Cryptobytes, vol. 5, no. 2. RSA Laboratories, 2002, pp. 2-13.
-
(2002)
Cryptobytes
, vol.5
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
16
-
-
0012575586
-
Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
-
Dec.
-
Hu Y, Perrig A, Johnson D,. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. Department of Computer Science, Rice University, Technical Report, Dec. 2001.
-
(2001)
Department of Computer Science, Rice University, Technical Report
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
18
-
-
84961572484
-
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
-
In, NY, June.
-
Hu Y, Johnson D, Perrig A,. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), IEEE, Calicoon, NY, June 2002.
-
(2002)
4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), IEEE, Calicoon
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
20
-
-
8344242588
-
-
Zhong S, Yang Y, Chen J,. Sprite: A Simple, Cheat-proof, Credit-based System for Mobile Ad Hoc Networks, 2002.
-
(2002)
Sprite: A Simple, Cheat-proof, Credit-based System for Mobile Ad Hoc Networks
-
-
Zhong, S.1
Yang, Y.2
Chen, J.3
-
21
-
-
11844300974
-
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
-
Heidelberg, September.
-
Kargl F, Schlott S, Klenk A, Geiss A, Weber M,. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks.Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Springer Lecture Notes in Computer Science, Heidelberg, September 2004.
-
(2004)
Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Springer Lecture Notes in Computer Science
-
-
Kargl, F.1
Schlott, S.2
Klenk, A.3
Geiss, A.4
Weber, M.5
-
22
-
-
33750012091
-
Cross-layer approach to detect data packet droppers in mobile ad-hoc networks
-
Self-Organizing Systems - First International Workshop, IWSOS 2006, and Third International Workshop on New Trends in Network Architectures and Services, EuroNGI 2006, Proceedings
-
Djenouri D, Badache N,. Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks. In Proc. of Int. Workshop on Self-Organizing Systems '06, ser. Lecture Notes in Computer Science, de, Meer H, Sterbenz JPG, (eds). Vol. 4124. Springer, 2006; 163-176. (Pubitemid 44568214)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4124
, pp. 163-176
-
-
Djenouri, D.1
Badache, N.2
-
23
-
-
0037885580
-
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks
-
Canary Islands, Spain: IEEE Computer Society, January 2002
-
Buchegger S, Boudec J-YL,. Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing. Canary Islands, Spain: IEEE Computer Society, January 2002, pp. 403-410.
-
Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing
, pp. 403-410
-
-
Buchegger, S.1
Boudec, J.-Y.2
-
24
-
-
0037885580
-
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks
-
In, Ed., Jan., pp.
-
Buchegger S, Boudec JL,. Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, IEEE Computer Society, Ed., Jan. 2002, pp. 403-410.
-
(2002)
Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, IEEE Computer Society
, pp. 403-410
-
-
Buchegger, S.1
Boudec, J.L.2
-
30
-
-
0000873984
-
AntNet: Distributed stigmergetic control for communications networks
-
Di Caro G, Dorigo M,. Antnet: Distributed Stigmergetic Control for Communications Networks. Journal of Artificial Intelligence Research 1998; 9: 317-365. (Pubitemid 128636207)
-
(1998)
Journal of Artificial Intelligence Research
, vol.9
, pp. 317-365
-
-
Di Caro, G.1
Dorigo, M.2
-
31
-
-
0030222462
-
Ant-based load balancing in telecommunications networks
-
Schoonderwoerd R, Bruten JL, Holland OE, Rothkrantz LJM,. Ant-Based Load Balancing in Telecommunications Networks. Adaptive Behavior 1996; 5 (2): 169-207. (Pubitemid 126174497)
-
(1996)
Adaptive Behavior
, vol.5
, Issue.2
, pp. 169-207
-
-
Schoonderwoerd, R.1
Bruten, J.L.2
Holland, O.E.3
Rothkrantz, L.J.M.4
-
32
-
-
84904326057
-
Routing Algorithms for Mobile Multi-hop Ad Hoc Networks
-
In on.
-
Günes M, Spaniol O,. Routing Algorithms for Mobile Multi-hop Ad Hoc Networks. In Net-C on 2003, 2003, 120-138.
-
(2003)
Net-C
, vol.2003
, pp. 120-138
-
-
Günes, M.1
Spaniol, O.2
-
33
-
-
11244347021
-
A Probabilistic Emergent Routing Algorithm for Mobile Ad hoc Networks
-
In, March,., 3 Mar. 2003.
-
Baras J, Mehta H,. A Probabilistic Emergent Routing Algorithm for Mobile Ad hoc Networks. In, March 3-5, 2003. WiOpt'03: Modeling and Optimization in Mobile Ad Hoc and Wireless Networks, 3 Mar. 2003.
-
(2003)
WiOpt'03: Modeling and Optimization in Mobile Ad Hoc and Wireless Networks
, pp. 3-5
-
-
Baras, J.1
Mehta, H.2
-
35
-
-
35048848576
-
-
Springer-Verlag: Birmingham, UK, Sept., no. 3242, best paper award.
-
Di Caro G, Ducatelle F, Gambardella LM,. AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks, ser. Lecture Notes in Computer Science. Springer-Verlag: Birmingham, UK, Sept. 2004, no. 3242, best paper award.
-
(2004)
AntHocNet: An Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks, Ser. Lecture Notes in Computer Science
-
-
Di Caro, G.1
Ducatelle, F.2
Gambardella, L.M.3
-
36
-
-
58149202488
-
Hopnet: A Hybrid Ant Colony Optimization Routing Algorithm for Mobile Ad Hoc Network
-
I. Bio-Inspired Computing and Communication in Wireless Ad Hoc and Sensor Networks.
-
Wang J, Osagie E, Thulasiraman P, Thulasiram RK,. Hopnet: A Hybrid Ant Colony Optimization Routing Algorithm for Mobile Ad Hoc Network. Ad Hoc Networks 2009; 7 (4): 690-705, I. Bio-Inspired Computing and Communication in Wireless Ad Hoc and Sensor Networks.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.4
, pp. 690-705
-
-
Wang, J.1
Osagie, E.2
Thulasiraman, P.3
Thulasiram, R.K.4
-
37
-
-
5044250232
-
When Ants attack: Security Issues for Stigmergic Systems
-
CS-2002-23, Apr.
-
Zhong W, Evans D,. When Ants attack: Security Issues for Stigmergic Systems. University of Virgina, Department of Computer Science, Tech. Rep. CS-2002-23, Apr. 2002.
-
(2002)
University of Virgina, Department of Computer Science, Tech. Rep
-
-
Zhong, W.1
Evans, D.2
-
38
-
-
49049119947
-
AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes
-
vol., pp.
-
Melchor CA, Salem BA, Gaborit P, Tamine K,. AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes. Availability, Reliability and Security, International Conference on, vol. 0, pp. 1052-1059, 2008.
-
(2008)
Availability, Reliability and Security, International Conference on
, vol.0
, pp. 1052-1059
-
-
Melchor, C.A.1
Salem, B.A.2
Gaborit, P.3
Tamine, K.4
-
40
-
-
0034819266
-
Improved AntNet routing
-
Baran B,. Improved AntNet Routing. SIGCOMM Computer Communication Review 2001; 31 (2): 42-48. (Pubitemid 32865522)
-
(2001)
Computer Communication Review
, vol.31
, Issue.2
, pp. 42-48
-
-
Baran, B.1
-
42
-
-
18744385858
-
JiST: An efficient approach to simulation using virtual machines
-
DOI 10.1002/spe.647
-
Barr R, Haas Z, van Renesse R,. JiST: an Efficient Approach to Simulation using Virtual Machines: Research Articles. Software Practical Experiments 2005; 35 (6): 539-576. (Pubitemid 40666710)
-
(2005)
Software - Practice and Experience
, vol.35
, Issue.6
, pp. 539-576
-
-
Barr, R.1
Haas, Z.J.2
Van Renesse, R.3
|