-
1
-
-
62349116211
-
-
Enhancements on and Evaluation of TOGBAD in Tactical MANETS. Proceedings of the 27th Military Communication Conference (MILCOM)
-
Gerhards-Padilla E, Aschenbruck N, Martini P. Enhancements on and Evaluation of TOGBAD in Tactical MANETS. Proceedings of the 27th Military Communication Conference (MILCOM), 2008.
-
(2008)
-
-
Gerhards-Padilla, E.1
Aschenbruck, N.2
Martini, P.3
-
2
-
-
47249164736
-
-
Detecting blackhole attacks in Tactical MANETs using topology graphs. Proceedings of the 3rd IEEE LCN Workshop on Network Security (WNS)
-
Gerhards-Padilla E, Aschenbruck N, Martini P, Jahnke M, Tölle J. Detecting blackhole attacks in Tactical MANETs using topology graphs. Proceedings of the 3rd IEEE LCN Workshop on Network Security (WNS), 2007.
-
(2007)
-
-
Gerhards-Padilla, E.1
Aschenbruck, N.2
Martini, P.3
Jahnke, M.4
Tölle, J.5
-
3
-
-
0035789229
-
-
The Quest for Security in Mobile Ad Hoc Networks. Proceedings of the 2nd ACM International Symposium on Mobile ad hoc Networking & Computing (MobiHOC)
-
Hubaux J, Buttyán L, Capkun S. The Quest for Security in Mobile Ad Hoc Networks. Proceedings of the 2nd ACM International Symposium on Mobile ad hoc Networking & Computing (MobiHOC), 2001.
-
(2001)
-
-
Hubaux, J.1
Buttyán, L.2
Capkun, S.3
-
4
-
-
85177236447
-
-
Ariadne: a secure on-demand routing protocol for ad hoc networks. Proceedings of the 8th ACM International Conference on Mobile Computing and Networking
-
Hu Y, Perrig A, Johnson D. Ariadne: a secure on-demand routing protocol for ad hoc networks. Proceedings of the 8th ACM International Conference on Mobile Computing and Networking, 2002.
-
(2002)
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
5
-
-
84947612457
-
-
Bedrohungen gegen taktische mobile Adhoc-Netzwerke (MANETs). FGAN/FKIE, Wachtberg, Germany, Tech. Rep., December 2005, appointed by the Federal Office for information management and information technology of the German Federal Armed Forces [in German].
-
Jahnke M, Tölle J. Bedrohungen gegen taktische mobile Adhoc-Netzwerke (MANETs). FGAN/FKIE, Wachtberg, Germany, Tech. Rep., December 2005, appointed by the Federal Office for information management and information technology of the German Federal Armed Forces [in German].
-
-
-
Jahnke, M.1
Tölle, J.2
-
6
-
-
79960393443
-
-
IETF Draft Simplified Multicast Forwarding for MANET, Available at:
-
Macker J. IETF Draft Simplified Multicast Forwarding for MANET, 2009. Available at:.
-
(2009)
-
-
Macker, J.1
-
7
-
-
79960423319
-
-
RFC 3626 Optimized Link State Routing Protocol (OLSR), Available at:
-
Clausen T, Jacquet P. RFC 3626 Optimized Link State Routing Protocol (OLSR), 2003. Available at:.
-
(2003)
-
-
Clausen, T.1
Jacquet, P.2
-
8
-
-
79960434598
-
-
IETF Draft MANET Neighborhood Discovery Protocol, Available at:
-
Clausen T, Dearlove C, Dean J. IETF Draft MANET Neighborhood Discovery Protocol, 2009. Available at:.
-
(2009)
-
-
Clausen, T.1
Dearlove, C.2
Dean, J.3
-
9
-
-
79960431684
-
-
IETF Draft The Optimized Link State Routing Protocol version 2, Available at:
-
Clausen T, Dearlove C, Jacquet P. IETF Draft The Optimized Link State Routing Protocol version 2, 2009. Available at:.
-
(2009)
-
-
Clausen, T.1
Dearlove, C.2
Jacquet, P.3
-
10
-
-
33744502133
-
-
Secure OLSR. Proceedings of the 19th International Conference on Advanced Information Networking and Applications
-
Hong F, Hong L, Fu C. Secure OLSR. Proceedings of the 19th International Conference on Advanced Information Networking and Applications, 2005.
-
(2005)
-
-
Hong, F.1
Hong, L.2
Fu, C.3
-
11
-
-
14844323027
-
-
An advanced signature system for OLSR. Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
-
Raffo D, Adjih C, Clausen T, Mühlethaler P. An advanced signature system for OLSR. Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, 2004.
-
(2004)
-
-
Raffo, D.1
Adjih, C.2
Clausen, T.3
Mühlethaler, P.4
-
12
-
-
33845927390
-
-
Smart handling of colluding black hole Attacks in MANETs and wireless sensor networks using multipath routing. Proceedings of 7th IEEE Workshop on Information Assurance
-
Ramaswami S, Upadhyaya S. Smart handling of colluding black hole Attacks in MANETs and wireless sensor networks using multipath routing. Proceedings of 7th IEEE Workshop on Information Assurance, 2006.
-
(2006)
-
-
Ramaswami, S.1
Upadhyaya, S.2
-
13
-
-
79960387351
-
-
RFC 3561 Ad hoc On-Demand Distance Vector (AODV) Routing, Available at:
-
Perkins C, Belding-Royer E, Das S. RFC 3561 Ad hoc On-Demand Distance Vector (AODV) Routing, 2003. Available at:.
-
(2003)
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
14
-
-
79960425472
-
-
IETF Draft Secure Ad hoc On-Demand Distance Vector (SAODV) Routing, Available at:
-
Zapata M. IETF Draft Secure Ad hoc On-Demand Distance Vector (SAODV) Routing, 2006. Available at:.
-
(2006)
-
-
Zapata, M.1
-
15
-
-
84961572484
-
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications(WMCSA)
-
Hu Y, Johnson D, Perrig A. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications(WMCSA), 2002.
-
(2002)
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
16
-
-
79960408290
-
-
A performance comparison of multi-hop wireless ad hoc network routing protocols. Proceedings of the 4th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom)
-
Broch J, Maltz D, Johnson D, Hu Y, Jetcheva J. A performance comparison of multi-hop wireless ad hoc network routing protocols. Proceedings of the 4th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 1998.
-
(1998)
-
-
Broch, J.1
Maltz, D.2
Johnson, D.3
Hu, Y.4
Jetcheva, J.5
-
17
-
-
0036986441
-
-
An on-demand secure routing protocol resilient to byzantine Failures. Proceedings of the 3rd ACM Workshop on Wireless Security
-
Awerbuch B, Holmer D, Nita-Rotaru C, Rubens H. An on-demand secure routing protocol resilient to byzantine Failures. Proceedings of the 3rd ACM Workshop on Wireless Security, 2002.
-
(2002)
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
18
-
-
84947614553
-
-
INSENS: intrusion-tolerant routing in wireless sensor networks. Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado.
-
Deng J, Han R, Mishra S. INSENS: intrusion-tolerant routing in wireless sensor networks. Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado.
-
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
19
-
-
84962808628
-
-
Cooperative security-enforcement routing in mobile ad hoc networks. Proceedings of the 4th International Workshop on Mobile and Wireless Communication Network
-
Lu B, Pooch U. Cooperative security-enforcement routing in mobile ad hoc networks. Proceedings of the 4th International Workshop on Mobile and Wireless Communication Network, 2002.
-
(2002)
-
-
Lu, B.1
Pooch, U.2
-
20
-
-
84943745348
-
-
Secure link state routing for mobile ad hoc networks. Proceedings of the IEEE Workshop on Security and Assurance in Ad hoc Networks
-
Papadimitratos P, Haas Z. Secure link state routing for mobile ad hoc networks. Proceedings of the IEEE Workshop on Security and Assurance in Ad hoc Networks, 2003.
-
(2003)
-
-
Papadimitratos, P.1
Haas, Z.2
-
21
-
-
79960417807
-
-
An on-demand secure routing protocol resilient to byzantine failures. Proceedings of the 1st IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks
-
Awerbuch B, Curtmola R, Holmer D, Rubens H, Nita-Rotaru C. An on-demand secure routing protocol resilient to byzantine failures. Proceedings of the 1st IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.
-
(2005)
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Rubens, H.4
Nita-Rotaru, C.5
-
22
-
-
35248846963
-
-
A performance evaluation of intrusion-tolerant routing in wireless sensor networks. Proceedings of the 2nd IEEE International Workshop on Information Processing in Sensor Networks
-
Deng J, Han R, Mishra S. A performance evaluation of intrusion-tolerant routing in wireless sensor networks. Proceedings of the 2nd IEEE International Workshop on Information Processing in Sensor Networks, 2003.
-
(2003)
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
23
-
-
79960406545
-
-
RFC 4728 The Dynamic Source Routing Protocol (DSR)
-
Johnson D, Hu Y, Maltz D. RFC 4728 The Dynamic Source Routing Protocol (DSR), 2007.
-
(2007)
-
-
Johnson, D.1
Hu, Y.2
Maltz, D.3
-
24
-
-
79960396542
-
-
Efficient and secure source authentication for multicast. Network and Distributed System Security Symposium
-
Perrig A, Canetti R, Song D, Tygar J. Efficient and secure source authentication for multicast. Network and Distributed System Security Symposium, 2001.
-
(2001)
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.4
-
25
-
-
0033690336
-
-
Efficient authentication and signing of multicast streams over lossy channels. IEEE Symposium on Security and Privacy
-
Perrig A, Canetti R, Tygar J, Song D. Efficient authentication and signing of multicast streams over lossy channels. IEEE Symposium on Security and Privacy, 2000.
-
(2000)
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
26
-
-
79960417051
-
-
Combining certification-based authentication and intrusion detection to secure Manet Routing Protocols. Proceedings of the 5th European Wireless Conference (Mobile and Wireless Systems beyond 3G)
-
Puttini R, de Sousa R, Mé L. Combining certification-based authentication and intrusion detection to secure Manet Routing Protocols. Proceedings of the 5th European Wireless Conference (Mobile and Wireless Systems beyond 3G), 2004.
-
(2004)
-
-
Puttini, R.1
de Sousa, R.2
Mé, L.3
-
27
-
-
33749048761
-
-
An effective intrusion detection approach for OLSR MANET protocol. Proceedings of 1st IEEE ICNP Workshop on Secure Network Protocols
-
Wang M, Lamont L, Mason P, Gorlatova M. An effective intrusion detection approach for OLSR MANET protocol. Proceedings of 1st IEEE ICNP Workshop on Secure Network Protocols, 2005.
-
(2005)
-
-
Wang, M.1
Lamont, L.2
Mason, P.3
Gorlatova, M.4
-
28
-
-
79960395873
-
-
Sensors for Detection of Misbehaving Nodes in MANETs. Praxis der Informationsverarbeitung und Kommunikation (PIK) 01/2005, K.G. Saur, Munich, Germany
-
Kargl F, Schlott S, Weber P. Sensors for Detection of Misbehaving Nodes in MANETs. Praxis der Informationsverarbeitung und Kommunikation (PIK) 01/2005, K.G. Saur, Munich, Germany, 2005.
-
(2005)
-
-
Kargl, F.1
Schlott, S.2
Weber, P.3
-
29
-
-
79960425470
-
-
Sicherheit in Mobilen Ad hoc Netzwerken. Ph.D. Dissertation, Universität Ulm, in German].
-
Kargl F. Sicherheit in Mobilen Ad hoc Netzwerken. Ph.D. Dissertation, Universität Ulm, 2003 [in German].
-
(2003)
-
-
Kargl, F.1
-
30
-
-
79960427079
-
-
ns Network Simulator
-
McCanne S, Floyd S. ns Network Simulator, 2006.
-
(2006)
-
-
McCanne, S.1
Floyd, S.2
-
32
-
-
85017404375
-
-
A group mobility model for ad hoc wireless networks. Proceedings of the 2nd ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems
-
Hong X, Gerla M, Pei G, Chiang C. A group mobility model for ad hoc wireless networks. Proceedings of the 2nd ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 1999.
-
(1999)
-
-
Hong, X.1
Gerla, M.2
Pei, G.3
Chiang, C.4
-
33
-
-
79960430174
-
-
The spatial node distribution of the random waypoint mobility model. Proceedings of the 1st German Workshop on Mobile Ad-Hoc Networks (WMAN)
-
Bettstetter C, Wagner C. The spatial node distribution of the random waypoint mobility model. Proceedings of the 1st German Workshop on Mobile Ad-Hoc Networks (WMAN), 2002.
-
(2002)
-
-
Bettstetter, C.1
Wagner, C.2
-
34
-
-
0042014530
-
-
Random waypoint considered harmful. Proceedings of 22nd IEEE Infocom
-
Yoon J, Liu M, Noble B. Random waypoint considered harmful. Proceedings of 22nd IEEE Infocom, 2003.
-
(2003)
-
-
Yoon, J.1
Liu, M.2
Noble, B.3
-
35
-
-
79960416174
-
-
NATO Standardization Agency. The 1200 and 2400 Bit/s NATO Interoperable Narrowband Voice Coder. STANAG 4591
-
NATO Standardization Agency. The 1200 and 2400 Bit/s NATO Interoperable Narrowband Voice Coder. STANAG 4591, 2002.
-
(2002)
-
-
-
36
-
-
79960392209
-
-
Wireless Communications-Principles & Practice. Prentice Hall Communications Engineering and Emerging Technologies Series: Prentice Hall Professional Technical Reference
-
Rappaport TS. Wireless Communications-Principles & Practice. Prentice Hall Communications Engineering and Emerging Technologies Series: Prentice Hall Professional Technical Reference, 1996.
-
(1996)
-
-
Rappaport, T.S.1
-
37
-
-
84947616815
-
-
MITE-MANET intrusion detection for tactical environments. Proceedings ot the RTO IST-22-PBM Symposium
-
Jahnke M, Aschenbruck N, Gerhards-Padilla E, et al. MITE-MANET intrusion detection for tactical environments. Proceedings ot the RTO IST-22-PBM Symposium, 2008.
-
(2008)
-
-
Jahnke, M.1
Aschenbruck, N.2
Gerhards-Padilla, E.3
-
38
-
-
79960385775
-
-
Homepage of OpenVZ. OpenVZ
-
Homepage of OpenVZ. OpenVZ, 2009.
-
(2009)
-
-
|