-
1
-
-
11244252132
-
Denial of service resilience in ad hoc networks
-
Philadelphia, PA, USA
-
Aad I, Hubaux J-P, Knightly EW. Denial of service resilience in ad hoc networks. In: Proceedings of the 10th annual international conference on mobile computing and networking (MobiCom), Philadelphia, PA, USA, 2004. p. 202-15.
-
(2004)
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 202-215
-
-
Aad, I.1
Hubaux, J.-P.2
Knightly, E.W.3
-
2
-
-
58049135707
-
Cooperative black and gray hole attacks in mobile ad hoc networks
-
Suwon, Korea
-
Agrawal P, Ghosh RK, Das SK. Cooperative black and gray hole attacks in mobile ad hoc networks. In: Proceedings of the 2nd international conference on ubiquitous information management and communication (ICUIMC), Suwon, Korea, 2008. p. 310-4.
-
(2008)
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication (ICUIMC)
, pp. 310-314
-
-
Agrawal, P.1
Ghosh, R.K.2
Das, S.K.3
-
3
-
-
46449089099
-
HEAP: A packet authentication scheme for mobile ad hoc networks
-
10.1016/j.adhoc.2007.11.002
-
R. Akbani, T. Korkmaz, and G. Raju HEAP: a packet authentication scheme for mobile ad hoc networks Ad Hoc Networks 6 7 2008 1134 1150 10.1016/j.adhoc.2007.11.002
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.7
, pp. 1134-1150
-
-
Akbani, R.1
Korkmaz, T.2
Raju, G.3
-
4
-
-
84961352464
-
A witness-aided routing protocol for mobile ad-hoc networks with unidirectional links
-
H. Leong, W.-C. Lee, B. Li, L. Yin, Springer Berlin, Heidelberg
-
I. Aron, and S. Gupta A witness-aided routing protocol for mobile ad-hoc networks with unidirectional links H. Leong, W.-C. Lee, B. Li, L. Yin, Mobile data access. Lecture notes in computer science vol. 1748 1999 Springer Berlin, Heidelberg 24 33
-
(1999)
Mobile Data Access. Lecture Notes in Computer Science
, vol.1748
, pp. 24-33
-
-
Aron, I.1
Gupta, S.2
-
5
-
-
17144399950
-
Secure node misbehaviors in mobile ad hoc networks
-
Washington, DC, USA: IEEE Computer Society; 2004
-
Chigan C, Bandaru R. Secure node misbehaviors in mobile ad hoc networks. In: IEEE 60th Vehicular technology conference, 2004, VTC2004-Fall. 2004. Washington, DC, USA: IEEE Computer Society; 2004. p. 4730-4. doi: 10.1109/VETECF.2004.1404990.
-
(2004)
IEEE 60th Vehicular Technology Conference, 2004, VTC2004-Fall
, pp. 4730-4734
-
-
Chigan, C.1
Bandaru, R.2
-
6
-
-
70549106079
-
Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET
-
ACM New York, NY, USA
-
F. De Rango, and S. Marano Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET Proceedings of the 2009 international conference on wireless communications and mobile computing: connecting the world wirelessly, IWCMC 09 2009 ACM New York, NY, USA 1443 1448
-
(2009)
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 09
, pp. 1443-1448
-
-
De Rango, F.1
Marano, S.2
-
7
-
-
84860379187
-
A distributed security scheme for ad hoc networks
-
D. Gada, R. Gogri, P. Rathod, Z. Dedhia, N. Mody, and S. Sanyal A distributed security scheme for ad hoc networks Crossroads 11 2004 5
-
(2004)
Crossroads
, vol.11
, pp. 5
-
-
Gada, D.1
Gogri, R.2
Rathod, P.3
Dedhia, Z.4
Mody, N.5
Sanyal, S.6
-
11
-
-
84860364156
-
Re: [MANET] one way hash in SAODV
-
8 January
-
Guerrero-Zapata M. Re: [MANET] one way hash in SAODV. IETF MANET Working Group Discussions, 8 January 2003. URL 〈 http://www.ietf.org/mail-archive/ web/manet/current/msg01443.html 〉.
-
(2003)
IETF MANET Working Group Discussions
-
-
Guerrero-Zapata, M.1
-
12
-
-
0036980294
-
Securing ad hoc routing protocols
-
Atlanta, Georgia, USA
-
Guerrero-Zapata M, Asokan N. Securing ad hoc routing protocols. In: Proceedings of the 2002 ACM workshop on wireless security (WiSe 2002), Atlanta, Georgia, USA, 2002. p. 1-10.
-
(2002)
Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002)
, pp. 1-10
-
-
Guerrero-Zapata, M.1
Asokan, N.2
-
15
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Callicoon, NY, USA
-
Hu Y-C, Johnson D, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the fourth IEEE workshop on mobile computing systems and applications (WMCSA), Callicoon, NY, USA, 2002. p. 3-13.
-
(2002)
Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA)
, pp. 3-13
-
-
Hu, Y.-C.1
Johnson, D.2
Perrig, A.3
-
16
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
ACM New York, NY, USA
-
Y.-C. Hu, A. Perrig, and D.B. Johnson Rushing attacks and defense in wireless ad hoc network routing protocols Proceedings of the 2nd ACM workshop on wireless security, WiSe 03 2003 ACM New York, NY, USA 30 40 〈 http://doi.acm.org/10.1145/941311.941317 〉
-
(2003)
Proceedings of the 2nd ACM Workshop on Wireless Security, WiSe 03
, pp. 30-40
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
17
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, A. Perrig, and D.B. Johnson Ariadne: a secure on-demand routing protocol for ad hoc networks Wireless Networks 11 1-2 2005 21 38
-
(2005)
Wireless Networks
, vol.11
, Issue.12
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
18
-
-
29844454971
-
A secure ad-hoc routing approach using localized self-healing communities
-
Urbana-Champaign, IL, USA
-
Kong J, Hong X, Yi Y, Park J-S, Liu J, Gerla M. A secure ad-hoc routing approach using localized self-healing communities. In: Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing (MobiHoc), Urbana-Champaign, IL, USA, 2005. p. 254-65.
-
(2005)
Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 254-265
-
-
Kong, J.1
Hong, X.2
Yi, Y.3
Park, J.-S.4
Liu, J.5
Gerla, M.6
-
19
-
-
74949088648
-
SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks
-
ACM New York, NY, USA
-
Q. Li, Y.-C. Hu, M. Zhao, A. Perrig, J. Walker, and W. Trappe SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks Proceedings of the 2008 ACM symposium on information computer and communications security, ASIACCS 08 2008 ACM New York, NY, USA 201 204
-
(2008)
Proceedings of the 2008 ACM Symposium on Information Computer and Communications Security, ASIACCS 08
, pp. 201-204
-
-
Li, Q.1
Hu, Y.-C.2
Zhao, M.3
Perrig, A.4
Walker, J.5
Trappe, W.6
-
20
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
Paris, France
-
Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM. A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE international conference on network protocols (ICNP), Paris, France, 2002. p. 78-89.
-
(2002)
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP)
, pp. 78-89
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
21
-
-
74949096170
-
SEAODV: Secure efficient AODV routing protocol for MANETs networks
-
Seoul, Korea
-
Mohammadizadeh M, Movaghar A, Safi SM. SEAODV: secure efficient AODV routing protocol for MANETs networks. In: Proceedings of the 2nd international conference on interaction sciences: information technology, culture and human (ICIS), Seoul, Korea, 2009. p. 940-44.
-
(2009)
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS)
, pp. 940-944
-
-
Mohammadizadeh, M.1
Movaghar, A.2
Safi, S.M.3
-
22
-
-
84903836776
-
How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
-
West Point, New York, USA
-
Ning P, Sun K. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. In: Proceedings of the IEEE systems, man and cybernetics society information assurance workshop (IAW), West Point, New York, USA, 2003. p. 60-7.
-
(2003)
Proceedings of the IEEE Systems, Man and Cybernetics Society Information Assurance Workshop (IAW)
, pp. 60-67
-
-
Ning, P.1
Sun, K.2
-
23
-
-
0742292815
-
Ad hoc on-demand distance vector (AODV) routing
-
Perkins C, Belding-Royer E, Das S. Ad hoc on-demand distance vector (AODV) routing, RFC 3561.
-
RFC
, vol.3561
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
25
-
-
0034449688
-
Techniques for intrusion-resistant ad hoc routing algorithms (TIARA)
-
Los Angeles, CA, USA
-
Ramanujan R, Ahamad A, Bonney J, Hagelstrom R, Thurber K. Techniques for intrusion-resistant ad hoc routing algorithms (TIARA). In: Proceedings of the 21st century military communications conference (MILCOM), vol. 2, Los Angeles, CA, USA, 2000. p. 660-4.
-
(2000)
Proceedings of the 21st Century Military Communications Conference (MILCOM)
, vol.2
, pp. 660-664
-
-
Ramanujan, R.1
Ahamad, A.2
Bonney, J.3
Hagelstrom, R.4
Thurber, K.5
-
26
-
-
60049091288
-
SPREAD: Improving network security by multipath routing in mobile ad hoc networks
-
W. Lou, W. Liu, Y. Zhang, and Y. Fang SPREAD: improving network security by multipath routing in mobile ad hoc networks Wireless Networks 15 3 2009 279 294
-
(2009)
Wireless Networks
, vol.15
, Issue.3
, pp. 279-294
-
-
Lou, W.1
Liu, W.2
Zhang, Y.3
Fang, Y.4
-
27
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
ACM New York, NY, USA
-
C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt A specification-based intrusion detection system for AODV Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, SASN 03 2003 ACM New York, NY, USA 125 134
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 03
, pp. 125-134
-
-
Tseng, C.-Y.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
28
-
-
85008048689
-
Improving protocol robustness in ad hoc networks through cooperative packet caching and shortest multipath routing
-
A.C. Valera, W.K.G. Seah, and S.V. Rao Improving protocol robustness in ad hoc networks through cooperative packet caching and shortest multipath routing IEEE Transactions on Mobile Computing 4 5 2005 443 457
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.5
, pp. 443-457
-
-
Valera, A.C.1
Seah, W.K.G.2
Rao, S.V.3
-
29
-
-
21644441634
-
An intrusion detection tool for AODV-based ad hoc wireless networks
-
G. Vigna, S. Gwalani, K. Srinivasan, E.M. Belding-royer, and R.A. Kemmerer An intrusion detection tool for AODV-based ad hoc wireless networks 20th Annual computer security applications conference 2004 16 27
-
(2004)
20th Annual Computer Security Applications Conference
, pp. 16-27
-
-
Vigna, G.1
Gwalani, S.2
Srinivasan, K.3
Belding-Royer, E.M.4
Kemmerer, R.A.5
-
30
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang Security in mobile ad hoc networks: challenges and solutions IEEE Wireless Communications 11 1 2004 38 47
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
31
-
-
34547532527
-
A secure incentive protocol for mobile ad hoc networks
-
Y. Zhang, W. Lou, W. Liu, and Y. Fang A secure incentive protocol for mobile ad hoc networks Wireless Networks 13 2007 569 582
-
(2007)
Wireless Networks
, vol.13
, pp. 569-582
-
-
Zhang, Y.1
Lou, W.2
Liu, W.3
Fang, Y.4
|