-
2
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
CA, USA, October
-
J. Hubaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), CA, USA, October 2001
-
(2001)
Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)
-
-
Hubaux, J.1
Buttyan, L.2
Capkun, S.3
-
3
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
11:2-11, February
-
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang. Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications, 11:2-11, February 2004
-
(2004)
IEEE Wireless Communications
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
4
-
-
4544235014
-
Stimulating cooperative behavior of autonomous devices-an analysis of requirements and existing approaches
-
Angers, France, April
-
P. Obreiter, B. König-Ries, and M. Klein. Stimulating cooperative behavior of autonomous devices-an analysis of requirements and existing approaches. In Second International Workshop on Wireless Information Systems (WIS2003), Angers, France, April 2003
-
(2003)
Second International Workshop on Wireless Information Systems (WIS2003)
-
-
Obreiter, P.1
König-Ries, B.2
Klein, M.3
-
5
-
-
3042683143
-
Cooperation issues in mobile ad hoc networks
-
Tokyo, Japan, March
-
M. Conti, E. Gregori, and G. Maselli. Cooperation issues in mobile ad hoc networks. In Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCSW'04), Tokyo, Japan, March 2004
-
(2004)
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCSW'04)
-
-
Conti, M.1
Gregori, E.2
Maselli, G.3
-
7
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Portorosz, Slovenia, September
-
P. Michiardi and R. Molva. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of The 6th IFIP Communications and Multimedia Security Conference, pages 107-121, Portorosz, Slovenia, September 2002
-
(2002)
Proceedings of the 6th IFIP Communications and Multimedia Security Conference
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
9
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
October
-
L. Buttyán and J. P. Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. MONET, 8(5):579-592, October 2003
-
(2003)
MONET
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyán, L.1
Hubaux, J.P.2
-
11
-
-
84886577498
-
-
Aodv homepage
-
Aodv homepage. http://moment. cs. ucsb. edu/AODV/aodv. html
-
-
-
-
13
-
-
2942532010
-
Evolution and future directions of the ad hoc on-demand distance vector routing protocol
-
July
-
E. M. Belding-Royer and C. E. Perkins. Evolution and future directions of the ad hoc on-demand distance vector routing protocol. Ad hoc Networks Journal, 1(1):125-150, July 2003
-
(2003)
Ad Hoc Networks Journal
, vol.1
, Issue.1
, pp. 125-150
-
-
Belding-Royer, E.M.1
Perkins, C.E.2
-
14
-
-
4444349878
-
The dynamic source routing protocol for mobile ad hoc networks
-
July
-
J. Broch, D. B. Johnson, and D. A. Maltz. The dynamic source routing protocol for mobile ad hoc networks. Internet draft, IETF, July 2004
-
(2004)
Internet Draft, IETF
-
-
Broch, J.1
Johnson, D.B.2
Maltz, D.A.3
-
15
-
-
0032621035
-
A review of current routing protocols for ad-hoc mobile wireless networks
-
April
-
E. Royer and C. Toh. A review of current routing protocols for ad-hoc mobile wireless networks. Mobile Wireless Networks. IEEE Personal Communications, pages 46-55, April 1999
-
(1999)
Mobile Wireless Networks. IEEE Personal Communications
, pp. 46-55
-
-
Royer, E.1
Toh, C.2
-
16
-
-
33749992235
-
Towards reliable forwarding for ad hoc networks
-
Venice, Italy, September
-
M. Conti, E. Gregori, and G. Maselli. Towards reliable forwarding for ad hoc networks. In Proceeding of Personal Wireless Communications (PWC 2003), pages 790-804, Venice, Italy, September 2003
-
(2003)
Proceeding of Personal Wireless Communications (PWC 2003)
, pp. 790-804
-
-
Conti, M.1
Gregori, E.2
Maselli, G.3
-
17
-
-
4544226115
-
On using reputations in ad hoc networks to counter malicious nodes
-
Newport Beach, CA, USA, July
-
P. Dewan, P. Dasgupta, and A. Bhattacharya. On using reputations in ad hoc networks to counter malicious nodes. In Proceedings of the 10th International Conference on Parallel and Distributed Systems (ICPADS 2004), Newport Beach, CA, USA, July 2004
-
(2004)
Proceedings of the 10th International Conference on Parallel and Distributed Systems (ICPADS 2004)
-
-
Dewan, P.1
Dasgupta, P.2
Bhattacharya, A.3
-
18
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking (MOBICOM), pages 255-265, 2000
-
(2000)
Mobile Computing and Networking (MOBICOM)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
19
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
Spain. IEEE Computer Society
-
S. Buchegger and J. Y. Le Boudec. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, Spain, 2002. IEEE Computer Society
-
(2002)
Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing
-
-
Buchegger, S.1
Le Boudec, J.Y.2
-
23
-
-
71849087703
-
Preventing denial of service and selfishness in ad hoc networks
-
Lausanne, Switzerland, June
-
P. Michiardi and R. Molva. Preventing denial of service and selfishness in ad hoc networks. In Working Session on Security in Ad Hoc Networks, Lausanne, Switzerland, June 2002
-
(2002)
Working Session on Security in Ad Hoc Networks
-
-
Michiardi, P.1
Molva, R.2
-
24
-
-
2942662944
-
Simulation-based analysis of security exposures in mobile ad hoc networks
-
P. Michiardi and R. Molva. Simulation-based analysis of security exposures in mobile ad hoc networks. In European Wireless Conference, 2002
-
(2002)
European Wireless Conference
-
-
Michiardi, P.1
Molva, R.2
-
27
-
-
4544342574
-
A specification-based intrusion detection system for aodv
-
Fairfax, Virginia, October
-
C. Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt. A specification-based intrusion detection system for aodv. In Proceedings of the ACM workshop on Security of ad hoc and sensor networks (SASN '03), Fairfax, Virginia, October 2003
-
(2003)
Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03)
-
-
Tseng, C.Y.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
29
-
-
15244358870
-
Resisting malicious packet dropping in wireless ad hoc networks
-
Montreal, Canada, October
-
M. Just, E. Kranakis, and T. Wan. Resisting malicious packet dropping in wireless ad hoc networks. In Proceedings of ADHOCNOW'03, Montreal, Canada, October 2003
-
(2003)
Proceedings of ADHOCNOW'03
-
-
Just, M.1
Kranakis, E.2
Wan, T.3
-
32
-
-
0002101577
-
Reputation systems
-
P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman. Reputation systems. Commun. ACM, 43(12):45-48, 2000
-
(2000)
Commun. ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
33
-
-
0000664248
-
The broadcast storm problem in a mobile ad hoc network
-
Washington, USA, August
-
S. Y. Ni, Y. C. Tseng, Y. S. Chen, and J. P. Sheu. The broadcast storm problem in a mobile ad hoc network. In MobiCom '99: Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pages 151-162, Washington, USA, August 1999
-
(1999)
MobiCom '99: Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 151-162
-
-
Ni, S.Y.1
Tseng, Y.C.2
Chen, Y.S.3
Sheu, J.P.4
-
34
-
-
79751528480
-
Multipath routing in mobile ad hoc networks: Issues and challenges
-
S. Mueller, R. P. Tsang, and D. Ghosal. Multipath routing in mobile ad hoc networks: Issues and challenges. In MASCOTS Tutorials, 2003
-
(2003)
MASCOTS Tutorials
-
-
Mueller, S.1
Tsang, R.P.2
Ghosal, D.3
-
37
-
-
0042475197
-
A framework for reliable routing in mobile ad hoc networks
-
San Franciso, CA, USA
-
Z. Ye, S. V. Krishnamurthy, and Satish K. Tripathi. A framework for reliable routing in mobile ad hoc networks. In Proceedings IEEE INFOCOM 2003, San Franciso, CA, USA, 2003
-
(2003)
Proceedings IEEE INFOCOM 2003
-
-
Ye, Z.1
Krishnamurthy, S.V.2
Tripathi, S.K.3
-
39
-
-
84886513544
-
-
GloMoSim. http://pcl. cs. ucla. edu/projects/glomosim
-
GloMoSim
-
-
-
40
-
-
0037344515
-
Scalability study of the ad hoc on-demand distance vector routing protocol
-
March-April
-
S. J. Lee, E. M. Belding-Royer, and C. E. Perkins. Scalability study of the ad hoc on-demand distance vector routing protocol. International Journal on Network Management, 13(2):97-114, March-April 2003
-
(2003)
International Journal on Network Management
, vol.13
, Issue.2
, pp. 97-114
-
-
Lee, S.J.1
Belding-Royer, E.M.2
Perkins, C.E.3
-
42
-
-
0042014530
-
Random waypoint considered harmful
-
San Franciso, CA, USA
-
J. Yoon, M. Liu, and B. Noble. Random waypoint considered harmful. In Proceedings IEEE INFOCOM 2003, San Franciso, CA, USA, 2003.
-
(2003)
Proceedings IEEE INFOCOM 2003
-
-
Yoon, J.1
Liu, M.2
Noble, B.3
|