-
1
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Marti S, Giuli TJ, Lai K, Baker M,. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the Sixth ACM Annual International Conference on Mobile Computing and Networking (MOBICOM '00), Boston, MA, 2000; 255-265. (Pubitemid 32024700)
-
(2000)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 255-265
-
-
Marti Sergio1
Giuli, T.J.2
Lai Kevin3
Baker Mary4
-
2
-
-
33144479525
-
SCAN: Self-organized network-layer security in mobile ad hoc networks
-
DOI 10.1109/JSAC.2005.861384
-
Yang H, Shu J, Meng X, Lu S,. SCAN: self-organized network-layer security in mobile ad hoc networks. IEEE Journals on Selected Areas in Communications 2006; 24 (2): 261-273. (Pubitemid 43269748)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 261-273
-
-
Yang, H.1
Shu, J.2
Meng, X.3
Lu, S.4
-
3
-
-
80053050674
-
Self umpiring system for security in wireless mobile ad hoc networks
-
Kathirvel A, Srinivasan R,. Self umpiring system for security in wireless mobile ad hoc networks. Journal of Wireless Sensor Networks 2010; 2: 264-266.
-
(2010)
Journal of Wireless Sensor Networks
, vol.2
, pp. 264-266
-
-
Kathirvel, A.1
Srinivasan, R.2
-
5
-
-
21644472211
-
-
Scalable networks technologies: QualNet simulator version 5.0. [28 June 2010]
-
Network Simulator. Scalable networks technologies: QualNet simulator version 5.0 (2009). [28 June 2010].
-
(2009)
Network Simulator
-
-
-
8
-
-
0003417978
-
Glomosim: A scalable network simulation environment
-
University of California, Los Angeles, CA
-
Bajaj L, Takai M, Ahuja R, Bagrodia R, Gerla M,. Glomosim: a scalable network simulation environment. Technical Report 990027, University of California, Los Angeles, CA, 1999; 1-12.
-
(1999)
Technical Report 990027
, pp. 1-12
-
-
Bajaj, L.1
Takai, M.2
Ahuja, R.3
Bagrodia, R.4
Gerla, M.5
-
11
-
-
15844404847
-
Secure ad hoc on-demand distance vector (SAODV) routing
-
Zapata MG,. Secure ad hoc on-demand distance vector (SAODV) routing, IETF MANET list (2001).
-
(2001)
IETF MANET List
-
-
Zapata, M.G.1
-
12
-
-
77949297212
-
SAODV: A MANET routing protocol that can withstand black hole attack
-
Lu S, Li L, Lam K-Y, Jia L,. SAODV: a MANET routing protocol that can withstand black hole attack. In Proceedings of International Conference on Computational Intelligence and Security, Vol. 2, 2009; 421-425.
-
(2009)
Proceedings of International Conference on Computational Intelligence and Security
, vol.2
, pp. 421-425
-
-
Lu, S.1
Li, L.2
Lam, K.-Y.3
Jia, L.4
-
14
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
Paris
-
Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM,. A secure routing protocol for ad hoc networks. In Proceedings of the Tenth IEEE International Conference on Network Protocols (ICNP 2002), Paris, 2002; 78-87.
-
(2002)
Proceedings of the Tenth IEEE International Conference on Network Protocols (ICNP 2002)
, pp. 78-87
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
15
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Callicoon, NY
-
Hu Y, Johnson D, Perrig A,. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), Callicoon, NY, 2002; 3-13.
-
(2002)
Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002)
, pp. 3-13
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
16
-
-
0036957315
-
Ariadne: A secure on-demand routing for ad hoc networks
-
Atlanta, GA
-
Hu Y, Perrig A, Johnson D,. Ariadne: a secure on-demand routing for ad hoc networks. In Proceedings of the ACM Conference on Mobile Computing and Networking (MOBICOM 2002), Atlanta, GA, 2002; 12-23.
-
(2002)
Proceedings of the ACM Conference on Mobile Computing and Networking (MOBICOM 2002)
, pp. 12-23
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
18
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
Kong J, Zerfos P, Luo H, Lu S, Zhang L,. Providing robust and ubiquitous security support for MANET. In Proceedings of the Ninth International Conference on Network Protocols, Riverside, CA, 2001; 251-260. (Pubitemid 34099990)
-
(2001)
International Conference on Network Protocols
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
19
-
-
39749097095
-
A novel cryptography for ad hoc network security
-
Yong PJ, Song LX, Ai W, Dan L,. A novel cryptography for ad hoc network security. In Proceedings of IEEE International Conference on Communications, Circuits and Systems, Vol. 3, 2006; 1448-1451.
-
(2006)
Proceedings of IEEE International Conference on Communications, Circuits and Systems
, vol.3
, pp. 1448-1451
-
-
Yong, P.J.1
Song, L.X.2
Ai, W.3
Dan, L.4
-
20
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
Long Beach, CA
-
Hubaux J, Buttyan L, Capkun S,. The quest for security in mobile ad hoc networks. In Proceedings of the ACM Mobile Ad Hoc Networking and Computing (MOBIHOC 2001), Long Beach, CA, 2001; 146-155.
-
(2001)
Proceedings of the ACM Mobile Ad Hoc Networking and Computing (MOBIHOC 2001)
, pp. 146-155
-
-
Hubaux, J.1
Buttyan, L.2
Capkun, S.3
-
22
-
-
38549088052
-
Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks
-
DOI 10.1109/ICC.2007.196, 4288867, 2007 IEEE International Conference on Communications, ICC'07
-
Nasser N, Chen Y,. Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. In Proceedings of ACS/IEEE International Conference on Computer Systems and Applications, Amman, Jordan, 2007; 1154-1159. (Pubitemid 351145693)
-
(2007)
IEEE International Conference on Communications
, pp. 1154-1159
-
-
Nasser, N.1
Chen, Y.2
-
23
-
-
47849096949
-
Certification and revocation schemes in ad hoc networks survey and challenges
-
Cap Eterel, France
-
Azer MA, El-Kassas SM, El-Soudani MS,. Certification and revocation schemes in ad hoc networks survey and challenges. In Proceedings of Second International Conference on Systems and Networks Communications (ICSNC), Cap Eterel, France, 2007; 17.
-
(2007)
Proceedings of Second International Conference on Systems and Networks Communications (ICSNC)
, pp. 17
-
-
Azer, M.A.1
El-Kassas, S.M.2
El-Soudani, M.S.3
-
28
-
-
39349084494
-
Logical wormhole prevention in optimized link state routing protocol
-
DOI 10.1109/GLOCOM.2007.195, 4411105, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
-
Attir A, Abdesselem FN, Bensaou B, Ben-Othman J,. Logical wormhole prevention in optimized link state routing protocol. In Proceedings of IEEE Global Telecommunications Conference, 2007; 1011-1016. (Pubitemid 351259183)
-
(2007)
GLOBECOM - IEEE Global Telecommunications Conference
, pp. 1011-1016
-
-
Attir, A.1
Nait-Abdesselam, F.2
Bensaou, B.3
Ben-Othman, J.4
-
29
-
-
0242527340
-
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
-
Annapolis, MD
-
Ben Salem N, Buttyan L, Hubaux J-P, Jakobsson M,. A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. In MOBIHOC 2003, Annapolis, MD, 2003; 13-24.
-
(2003)
MOBIHOC 2003
, pp. 13-24
-
-
Ben Salem, N.1
Buttyan, L.2
Hubaux, J.-P.3
Jakobsson, M.4
-
30
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
Yang H, Luo H, Ye F, Lu S, Zhang L,. Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications 2004; 11: 38-47.
-
(2004)
IEEE Wireless Communications
, vol.11
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
31
-
-
37549036320
-
Multi-path based secure communication in wireless mesh networks
-
Ding X, Fan M, Lu X, Zhu D, Wang J,. Multi-path based secure communication in wireless mesh networks. Journals of Systems Engineering and Electronics 2007; 18 (4): 818-824.
-
(2007)
Journals of Systems Engineering and Electronics
, vol.18
, Issue.4
, pp. 818-824
-
-
Ding, X.1
Fan, M.2
Lu, X.3
Zhu, D.4
Wang, J.5
-
32
-
-
42649134446
-
Special issue: Resource management and routing in wireless mesh networks
-
Zhou X, Zhang L,. Special issue: resource management and routing in wireless mesh networks. Computer Communications 2008; 31 (7): 1255-1258.
-
(2008)
Computer Communications
, vol.31
, Issue.7
, pp. 1255-1258
-
-
Zhou, X.1
Zhang, L.2
-
33
-
-
77349101597
-
A mobility management scheme for wireless mesh networks based on a hybrid routing protocol
-
Zhang Z, Pazzi WR, Boukerche A,. A mobility management scheme for wireless mesh networks based on a hybrid routing protocol. Computer Networks 2010; 54 (4): 558-572.
-
(2010)
Computer Networks
, vol.54
, Issue.4
, pp. 558-572
-
-
Zhang, Z.1
Pazzi, W.R.2
Boukerche, A.3
-
37
-
-
34547497278
-
Enhancing nodes cooperation in ad hoc networks
-
DOI 10.1109/WONS.2007.340492, 4142718, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services, WONS'07
-
Hauspie M, Simplot-Ryl I,. Enhancing nodes cooperation in ad hoc networks. In Proceedings of IEEE Fourth Annual Conference on Wireless on Demand Network Systems and Services, 2007; 130-137. (Pubitemid 47179338)
-
(2007)
2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services, WONS'07
, pp. 130-137
-
-
Hauspie, M.1
Simplot-Ryl, I.2
-
38
-
-
85089416445
-
A distance routing effect algorithm for mobility (DREAM)
-
Dallas, TX
-
Basagni S, Chlamtac I, Syrotiuk VR, Woodward BA,. A distance routing effect algorithm for mobility (DREAM). In Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), Dallas, TX, 1998; 76-84.
-
(1998)
Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM)
, pp. 76-84
-
-
Basagni, S.1
Chlamtac, I.2
Syrotiuk, V.R.3
Woodward, B.A.4
-
39
-
-
85106319926
-
A performance comparison of multihop wireless ad hoc network routing protocols
-
Dallas, TX
-
Broch J, Maltz D, Johnson D, Ou YC, Jetcheva J,. A performance comparison of multihop wireless ad hoc network routing protocols. In Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM '98), Dallas, TX, 1998; 85-97.
-
(1998)
Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM '98)
, pp. 85-97
-
-
Broch, J.1
Maltz, D.2
Johnson, D.3
Ou, Y.C.4
Jetcheva, J.5
-
40
-
-
80053053362
-
A study on salvaging route reply for AODV protocol in the presence of malicious nodes
-
Kathirvel A, Srinivasan R,. A study on salvaging route reply for AODV protocol in the presence of malicious nodes. International Journal of Engineering and Technology 2009; 1 (2): 151-155.
-
(2009)
International Journal of Engineering and Technology
, vol.1
, Issue.2
, pp. 151-155
-
-
Kathirvel, A.1
Srinivasan, R.2
|