-
1
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
Sept.
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An On-Demand Secure Routing Protocol Resilient to Byzantine Failures," Proc. ACM WiSe, pp. 21-30, Sept. 2002.
-
(2002)
Proc. ACM WiSe
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
2
-
-
4544308674
-
Observation-based cooperation enforcement in ad hoc networks
-
Standford Univ.
-
S. Bansal and M. Baker, "Observation-Based Cooperation Enforcement in Ad Hoc Networks," Research Report cs. NI/0307012, Standford Univ., 2003.
-
(2003)
Research Report Cs. NI/0307012
-
-
Bansal, S.1
Baker, M.2
-
4
-
-
33845919346
-
Evaluation of a stastical technique to mitigate malicious control packets in ad hoc networks
-
DOI 10.1109/WOWMOM.2006.43, 1648514, Proceedings - WoWMoM 2006: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks
-
R.V. Boppana and S. Desilva, "Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks," Proc. Int'l Symp. World of Wireless Mobile and Multimedia Networks (WoWMoM)/Workshop Advanced Experimental Activities on Wireless Networks and Systems, pp. 559-563, 2006. (Pubitemid 46028700)
-
(2006)
Proceedings - WoWMoM 2006: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks
, vol.2006
, pp. 559-563
-
-
Boppana, R.V.1
Desilva, S.2
-
7
-
-
0242696192
-
Performance analysis of the confidant protocol: Cooperation of nodes fairness in dynamic ad-hoc networks
-
S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the Confidant Protocol: Cooperation of Nodes Fairness in Dynamic Ad-Hoc Networks," Proc. IEEE/ACM MobiHoc, 2002.
-
(2002)
Proc. IEEE/ACM MobiHoc
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
8
-
-
70449473979
-
RF in the jungle: Effect of environment assumptions on wireless experiment repeatability
-
R. Burchfield, E. Nourbakhsh, J. Dix, K. Sahu, S. Venkatesan, and R. Prakash, "RF in the Jungle: Effect of Environment Assumptions on Wireless Experiment Repeatability," Proc. IEEE Int'l Conf. Comm. (ICC '09), pp. 1-6, 2009.
-
(2009)
Proc. IEEE Int'l Conf. Comm. (ICC '09)
, pp. 1-6
-
-
Burchfield, R.1
Nourbakhsh, E.2
Dix, J.3
Sahu, K.4
Venkatesan, S.5
Prakash, R.6
-
9
-
-
0742294233
-
Mobile ad hoc networking: Imperatives and challenges
-
DOI 10.1016/S1570-8705(03)00013-1
-
I. Chlamtac, M. Conti, and J.J.-N. Liu, "Mobile Ad Hoc Networking: Imperatives and Challenges," Ad Hoc Networks, vol. 1, no. 1, pp. 13-64, 2003. (Pubitemid 40421395)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 13-64
-
-
Chlamtac, I.1
Conti, M.2
Liu, J.J.-N.3
-
11
-
-
35048850522
-
On trust establishment in mobile ad-hoc networks
-
L. Eschenauer, V.D. Gligor, and J. Baras, "On Trust Establishment in Mobile Ad-Hoc Networks," Proc. Security Protocols, pp. 47-66, 2003. (Pubitemid 39740604)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2845
, pp. 47-66
-
-
Eschenauer, L.1
Gligor, V.D.2
Baras, J.3
-
12
-
-
34548255006
-
Cooperation in mobile ad hoc networks
-
Dept. of Computer Science, Florida State Univ.
-
J. Hu, "Cooperation in Mobile Ad Hoc Networks," Technical Report TR-050111, Dept. of Computer Science, Florida State Univ., 2005.
-
(2005)
Technical Report TR-050111
-
-
Hu, J.1
-
15
-
-
35348910727
-
Improving wireless simulation through noise modeling
-
DOI 10.1145/1236360.1236364, IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
-
H. Lee, A. Cerpa, and P. Levis, "Improving Wireless Simulation through Noise Modeling," Proc. ACM Int'l Conf. Information Processing in Sensor Networks (IPSN '07), pp. 21-30, Apr. 2007. (Pubitemid 47582132)
-
(2007)
IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
, pp. 21-30
-
-
Lee, H.1
Cerpa, A.2
Levis, P.3
-
16
-
-
33947624156
-
An acknowledgement based approach for detection of routing misbehavior in manets
-
May
-
K. Liu, J. Deng, P.K. Varshney, and K. Balakrishnan, "An Acknowledgement Based Approach for Detection of Routing Misbehavior in Manets," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 488-502, May 2007.
-
(2007)
IEEE Trans. Mobile Computing
, vol.6
, Issue.5
, pp. 488-502
-
-
Liu, K.1
Deng, J.2
Varshney, P.K.3
Balakrishnan, K.4
-
17
-
-
33947624156
-
An acknowledgment-based approach for the detection of routing misbehavior in MANETs
-
May
-
K. Liu, J. Deng, P.K. Varshney, and K. Balakrishnan, "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 488-502, May 2007.
-
(2007)
IEEE Trans. Mobile Computing
, vol.6
, Issue.5
, pp. 488-502
-
-
Liu, K.1
Deng, J.2
Varshney, P.K.3
Balakrishnan, K.4
-
18
-
-
5044222209
-
A dynamic trust model for mobile ad hoc networks
-
Z. Liu, A. Joy, and R. Thompson, "A Dynamic Trust Model for Mobile Ad Hoc Networks," Proc. 10th IEEE Int'l Workshop Future Trends of Distributed Computing Systems (FTDCS '04), pp. 80-85, 2004.
-
(2004)
Proc. 10th IEEE Int'l Workshop Future Trends of Distributed Computing Systems (FTDCS '04)
, pp. 80-85
-
-
Liu, Z.1
Joy, A.2
Thompson, R.3
-
19
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, "Self-Securing Ad Hoc Wireless Networks," Proc. Seventh IEEE Symp. Computers and Comm. (ISCC '02), 2002.
-
(2002)
Proc. Seventh IEEE Symp. Computers and Comm. (ISCC '02)
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
20
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, pp. 255-265, Aug. 2000. (Pubitemid 32024700)
-
(2000)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 255-265
-
-
Marti Sergio1
Giuli, T.J.2
Lai Kevin3
Baker Mary4
-
21
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
R. Molva and P. Michiardi, "Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," Proc. IFIP Comm. and Multimedia Security Conf., 2002.
-
(2002)
Proc. IFIP Comm. and Multimedia Security Conf.
-
-
Molva, R.1
Michiardi, P.2
-
22
-
-
79959507120
-
-
Seattle Wireless Project, http://www.seattlewireless.net, 2010.
-
(2010)
-
-
-
24
-
-
77956474272
-
Crosscheck mechanism to identify malicious nodes in ad hoc networks
-
X. Su and R.V. Boppana, "Crosscheck Mechanism to Identify Malicious Nodes in Ad Hoc Networks," Security and Comm. Networks, vol. 2, no. 1, pp. 45-54, 2009.
-
(2009)
Security and Comm. Networks
, vol.2
, Issue.1
, pp. 45-54
-
-
Su, X.1
Boppana, R.V.2
-
25
-
-
36849062699
-
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
-
DOI 10.1109/MWC.2007.4396943
-
B. Sun, L. Osborne, Y. Xiao, and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks," IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 56-63, Oct. 2007. (Pubitemid 350231654)
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.5
, pp. 56-63
-
-
Sun, B.1
Osborne, L.2
Xiao, Y.3
Guizani, S.4
-
26
-
-
84875379930
-
-
version 7.1.0.183 (R14)
-
The MathWorks Inc., MATLAB, version 7.1.0.183 (R14), http://www. mathworks.com/products/matlab, 2010.
-
(2010)
MATLAB
-
-
-
28
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
Feb.
-
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Comm., vol. 11, no. 1, pp. 38-47, Feb. 2004.
-
(2004)
IEEE Wireless Comm.
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
29
-
-
25844465866
-
HADOF: Defense against routing disruption in mobile ad hoc networks
-
W. Yu, Y. Sun, and K.J.R. Liu, "HADOF: Defense against Routing Disruption in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Yu, W.1
Sun, Y.2
Liu, K.J.R.3
|