-
1
-
-
0012843946
-
Multicast ad hoc on-demand distance vector (maodv)
-
draft-ietf-manet-maodv-00.txt, July
-
E. M. Royer and C. E. Perkins, "Multicast ad hoc on-demand distance vector (maodv)," IETF Internet-Draft, draft-ietf-manet-maodv-00.txt, July 2000.
-
(2000)
IETF Internet-Draft
-
-
Royer, E.M.1
Perkins, C.E.2
-
2
-
-
85056059061
-
Multicast operation of the ad-hoc on-demand distance vector routing protocol
-
New York, NY, USA: ACM
-
--, "Multicast operation of the ad-hoc on-demand distance vector routing protocol," in MobiCom '99: Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking. New York, NY, USA: ACM, 1999, pp. 207-218.
-
(1999)
MobiCom '99: Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 207-218
-
-
Royer, E.M.1
Perkins, C.E.2
-
3
-
-
33845497487
-
Securing maodv: Attacks and countermeasures
-
S. Roy, V. Gopala, A. Sanjeev, and S. S. Jajodia, "Securing maodv: Attacks and countermeasures," in in Proc. 2nd IEEE Intl. Conf. SECON. IEEE, 2005.
-
(2005)
Proc. 2nd IEEE Intl. Conf. SECON. IEEE
-
-
Roy, S.1
Gopala, V.2
Sanjeev, A.3
Jajodia, S.S.4
-
4
-
-
34548827597
-
A study of different types of attacks on multicast in mobile ad hoc networks
-
DOI 10.1016/j.adhoc.2006.07.005, PII S1570870506000709
-
H. L. Nguyen and U. T. Nguyen, "A study of different types of attacks on multicast in mobile ad hoc networks," Ad Hoc Netw., vol. 6, no. 1, pp. 32-46, 2008. (Pubitemid 47446449)
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.1
, pp. 32-46
-
-
Nguyen, H.L.1
Nguyen, U.T.2
-
5
-
-
36849079903
-
A survey of routing attacks in mobile ad hoc networks
-
DOI 10.1109/MWC.2007.4396947
-
B. Kannhavong, H. Nakayama, N. Nemoto, Y amd Kato, and A. Jamalipour, "A survey of routing attacks in mobile ad hoc networks," Wireless Communications, IEEE, vol. 14, no. 1, pp. 85-91, 2007. (Pubitemid 350231658)
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.5
, pp. 85-91
-
-
Kannhavong, B.1
Nakayama, H.2
Nemoto, Y.3
Kato, N.4
Jamalipour, A.5
-
6
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
New York, NY, USA: ACM
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols," in WiSe '03: Proceedings of the 2nd ACM workshop on Wireless security. New York, NY, USA: ACM, 2003, pp. 30-40.
-
(2003)
WiSe '03: Proceedings of the 2nd ACM Workshop on Wireless Security
, pp. 30-40
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
7
-
-
34548827597
-
A study of different types of attacks on multicast in mobile ad hoc networks
-
DOI 10.1016/j.adhoc.2006.07.005, PII S1570870506000709
-
H. L. Nguyen and U. T. Nguyen, "A study of different types of attacks on multicast in mobile ad hoc networks," Ad Hoc Netw., vol. 6, no. 1, pp. 32-46, 2008. (Pubitemid 47446449)
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.1
, pp. 32-46
-
-
Nguyen, H.L.1
Nguyen, U.T.2
-
8
-
-
24944539915
-
Twoack: Preventing selfishness in mobile ad hoc networks
-
New Orleans, LA, USA
-
K. Balakrishnan, J. Deng, and P. Varshney, "Twoack: Preventing selfishness in mobile ad hoc networks," in Proceeding of IEEE Wireless Comm. and Networking Conf, New Orleans, LA, USA, 2005.
-
(2005)
Proceeding of IEEE Wireless Comm. and Networking Conf.
-
-
Balakrishnan, K.1
Deng, J.2
Varshney, P.3
-
9
-
-
11244252132
-
Denial of service resilience in ad hoc networks
-
MobiCom 2004 - Proceedings of the Tenth Annual International Conference on Mobile Computing and Networking
-
I. Aad, J.-P. Hubaux, and E. W. Knightly, "Denial of service resilience in ad hoc networks," in MobiCom '04: Proceedings of the 10th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2004, pp. 202-215. (Pubitemid 40061941)
-
(2004)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 202-215
-
-
Aad, I.1
Hubaux, J.-P.2
Knightly, E.W.3
-
10
-
-
85083937286
-
Securing aodv against wormhole attacks in emergency manet multimedia communications
-
ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
-
E. A. Panaousis, L. Nazaryan, and C. Politis, "Securing aodv against wormhole attacks in emergency manet multimedia communications," in Mobimedia '09: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2009, pp. 1-7.
-
(2009)
Mobimedia '09: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
, pp. 1-7
-
-
Panaousis, E.A.1
Nazaryan, L.2
Politis, C.3
-
11
-
-
36849010124
-
A survey of attacks and countermeasures in mobile ad hoc networks
-
X. Yang, S. Xuemin, and D. Ding-Zhu, "A survey of attacks and countermeasures in mobile ad hoc networks," Wireless Network Security, pp. 103-135, 2007.
-
(2007)
Wireless Network Security
, pp. 103-135
-
-
Yang, X.1
Xuemin, S.2
Ding-Zhu, D.3
-
12
-
-
47049105796
-
Geographic ad hoc routing security: Attacks and countermeasures
-
Z. Zhou and K. Yow, "Geographic ad hoc routing security: Attacks and countermeasures," Ad Hoc and Sensor Wireless Networks, vol. 1, no. 3, pp. 235-253, 2005.
-
(2005)
Ad Hoc and Sensor Wireless Networks
, vol.1
, Issue.3
, pp. 235-253
-
-
Zhou, Z.1
Yow, K.2
-
13
-
-
85083937286
-
Securing aodv against wormhole attacks in emergency manet multimedia communications
-
ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
-
E. A. Panaousis, L. Nazaryan, and C. Politis, "Securing aodv against wormhole attacks in emergency manet multimedia communications," in Mobimedia '09: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2009, pp. 1-7.
-
(2009)
Mobimedia '09: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
, pp. 1-7
-
-
Panaousis, E.A.1
Nazaryan, L.2
Politis, C.3
-
14
-
-
39149132135
-
A secure group key management scheme for hierarchical mobile ad hoc networks
-
DOI 10.1016/j.adhoc.2007.04.006, PII S1570870507000959
-
D. Huang and D. Medhi, "A secure group key management scheme for hierarchical mobile ad hoc networks," Ad Hoc Netw., vol. 6, pp. 560-577, June 2008. [Online]. Available: http://portal.acm.org/citation.cfm?id=1346362. 1346636 (Pubitemid 351258393)
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.4
, pp. 560-577
-
-
Huang, D.1
Medhi, D.2
-
15
-
-
79952774581
-
Sorb: Secure on demand resilient to byzantine multicast routing in multihop wireless networks
-
R. Kalaidasan, V. Hemamalini, and A. K.Babu, "Sorb: Secure on demand resilient to byzantine multicast routing in multihop wireless networks," in ISCET 2010: Proceedings of International Symposium on Computer Engineering and Technology, 2010, pp. 131-141.
-
(2010)
ISCET 2010: Proceedings of International Symposium on Computer Engineering and Technology
, pp. 131-141
-
-
Kalaidasan, R.1
Hemamalini, V.2
Babu, A.K.3
-
16
-
-
60949084324
-
Bsmr: Byzantine-resilient secure multicast routing in multihop wireless networks
-
April. [Online]. Available
-
R. Curtmola and C. Nita-Rotaru, "Bsmr: Byzantine-resilient secure multicast routing in multihop wireless networks," IEEE Transactions on Mobile Computing, vol. 8, pp. 445-459, April 2009. [Online]. Available: http://dx.doi.org/10.1109/TMC.2008.134
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, pp. 445-459
-
-
Curtmola, R.1
Nita-Rotaru, C.2
-
18
-
-
77952357116
-
Srmaodv: A scalable reliable maodv for manet
-
New York, NY, USA: ACM
-
S. Sethi and S. K. Udgata, "Srmaodv: a scalable reliable maodv for manet," in ICWET '10: Proceedings of the International Conference and Workshop on Emerging Trends in Technology. New York, NY, USA: ACM, 2010, pp. 368-373.
-
(2010)
ICWET '10: Proceedings of the International Conference and Workshop on Emerging Trends in Technology
, pp. 368-373
-
-
Sethi, S.1
Udgata, S.K.2
-
19
-
-
12844276354
-
Aodv and ipv6 internet access for ad hoc networks
-
A. Nilsson, C. E. Perkins, A. J. Tuominen, R. Wakikawa, and J. T. Malinen, "Aodv and ipv6 internet access for ad hoc networks," SIGMOBILE Mob. Comput. Commun. Rev., vol. 6, no. 3, pp. 102-103, 2002.
-
(2002)
SIGMOBILE Mob. Comput. Commun. Rev.
, vol.6
, Issue.3
, pp. 102-103
-
-
Nilsson, A.1
Perkins, C.E.2
Tuominen, A.J.3
Wakikawa, R.4
Malinen, J.T.5
-
20
-
-
33745197327
-
Lhap: A lightweight network access control protocol for ad hoc networks
-
46 DRDC Ottawa TM
-
S. Zhu, S. Xu, S. Setia, S. Jajodia, and O. way Key Chain, "Lhap: a lightweight network access control protocol for ad hoc networks," in Journal of Ad Hoc Networks, 2006. 46 DRDC Ottawa TM.
-
(2006)
Journal of Ad Hoc Networks
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
Way, O.5
Chain, K.6
-
21
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
Washington, DC, USA: IEEE Computer Society
-
A. Perrig, J. D. Tygar, D. Song, and R. Canetti, "Efficient authentication and signing of multicast streams over lossy channels," in SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2000, p. 56.
-
(2000)
SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 56
-
-
Perrig, A.1
Tygar, J.D.2
Song, D.3
Canetti, R.4
-
22
-
-
58849162343
-
-
[Online]. Available
-
"Scalable networks." [Online]. Available: http://www.scalable- networks.com/products/qualnet/
-
Scalable Networks
-
-
-
23
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
DOI 10.1007/s11276-004-4744-y
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," Wirel. Netw., vol. 11, no. 1-2, pp. 21-38, 2005. (Pubitemid 40536374)
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
|