-
1
-
-
50149105732
-
Impact of denial of service attacks on ad hoc networks
-
Aad, I., Hubaux, J-P. and Knightly, E.W. (2008) 'Impact of denial of service attacks on ad hoc networks', IEEE/ACM Transactions on Networking, Vol. 16, No. 4, pp.791-802.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.4
, pp. 791-802
-
-
Aad, I.1
Hubaux, J.-P.2
Knightly, E.W.3
-
6
-
-
36849010124
-
A survey on attacks and countermeasures in mobile ad hoc networks
-
in Xiao, Y., Shen, X. and Du, D-Z. (Eds. Springer, New York, NY
-
Bing, W., Jianmin, C., Jie, W. and Cardei, M. (2007) 'A survey on attacks and countermeasures in mobile ad hoc networks', in Xiao, Y., Shen, X. and Du, D-Z. (Eds.): Wireless Network Security, Springer, New York, NY, pp.103-136.
-
(2007)
Wireless Network Security
, pp. 103-136
-
-
Bing, W.1
Jianmin, C.2
Jie, W.3
Cardei, M.4
-
7
-
-
77954342948
-
An adaptive approach to detecting black and gray hole attacks in ad hoc network
-
Cai, J., Yi, P., Chen, J. and Wang, Z. (2010) 'An adaptive approach to detecting black and gray hole attacks in ad hoc network', 24th IEEE International Conference on Advanced Information Networking and Applications, pp.775-780.
-
(2010)
24th IEEE International Conference on Advanced Information Networking and Applications
, pp. 775-780
-
-
Cai, J.1
Yi, P.2
Chen, J.3
Wang, Z.4
-
8
-
-
73149103936
-
The simulation and comparison of routing attacks on DSR protocol
-
Cai, J., Yi, P., Zhou, Y. and Liu, N. (2009) 'The simulation and comparison of routing attacks on DSR protocol', International Conference on Wireless Communications, Networking and Mobile Computing, pp.1-4.
-
(2009)
International Conference on Wireless Communications, Networking and Mobile Computing
, pp. 1-4
-
-
Cai, J.1
Yi, P.2
Zhou, Y.3
Liu, N.4
-
11
-
-
34547679832
-
Performance analysis of ad-hoc networks under black hole attacks
-
DOI 10.1109/SECON.2007.342872, 4147402, 2007 IEEE SoutheastCon
-
Dokurer, S., Erten, Y.M. and Acar, C.E. (2007) 'Performance analysis of ad-hoc networks under black hole attacks', Southeast Con., IEEE, pp.148-153. (Pubitemid 47208272)
-
(2007)
Conference Proceedings - IEEE SOUTHEASTCON
, pp. 148-153
-
-
Dokurer, S.1
Erten, Y.M.2
Acar, C.E.3
-
12
-
-
77950261227
-
A performance comparison of the ad hoc network protocols
-
Feng, Q., Cai, Z., Yang, J. and Hu, X. (2009) 'A performance comparison of the ad hoc network protocols', Second International Workshop on Computer Science and Engineering, pp.293-297.
-
(2009)
Second International Workshop on Computer Science and Engineering
, pp. 293-297
-
-
Feng, Q.1
Cai, Z.2
Yang, J.3
Hu, X.4
-
14
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Hu, Y., Perrig, A. and Johnson, D. (2003) 'Rushing attacks and defense in wireless ad hoc network routing protocols', ACM Workshop on Wireless Security, pp.30-40.
-
(2003)
ACM Workshop on Wireless Security
, pp. 30-40
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
15
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Hu, Y.C., Perrig, A. and Johnson, D.B. (2002) 'Ariadne: A secure on-demand routing protocol for ad hoc networks', Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp.12-23.
-
(2002)
Proceedings of the 8th Annual International Conference on Mobile Computing and Networking
, pp. 12-23
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
16
-
-
33144475784
-
Workhole attacks in wireless networks
-
Hu, Y.C., Perrig, A. and Johnson, D.B. (2006) 'Workhole attacks in wireless networks', IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp.370-380.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
17
-
-
0003574189
-
Advanced computer architecture: Parallelism
-
McGraw-Hill, New York
-
Hwang, K. (1993) 'Advanced computer architecture: Parallelism', Scalability, Programmability, McGraw-Hill, New York, pp.75-96.
-
(1993)
Scalability, Programmability
, pp. 75-96
-
-
Hwang, K.1
-
18
-
-
0003597247
-
-
IETF, Last accessed: 7 February
-
Johnson, D., Hu, Y. and Maltz, D. (2007) The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks, IETF, Last accessed: 7 February, 2011.
-
(2007)
The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks
, vol.2011
-
-
Johnson, D.1
Hu, Y.2
Maltz, D.3
-
19
-
-
50049105221
-
Routing protocol performance over intermittent links
-
Last accessed: February 7 2012
-
Kiwior, D. and Lam, L. (2007) 'Routing protocol performance over intermittent links', MITRE, Last accessed: February 7, 2012.
-
(2007)
MITRE
-
-
Kiwior, D.1
Lam, L.2
-
20
-
-
77951589739
-
An analytical model of routing, misbehavior, and countermeasures in mobile ad hoc networks
-
König, A., Seither D., Steinmetz, R. and Hollick, M. (2009) 'An analytical model of routing, misbehavior, and countermeasures in mobile ad hoc networks', Global Telecommunications Conference, pp.1-6.
-
(2009)
Global Telecommunications Conference
, pp. 1-6
-
-
König, A.1
Seither, D.2
Steinmetz, R.3
Hollick, M.4
-
21
-
-
84856941187
-
Routing security in ad hoc networks
-
Lundberg, J. (2000) 'Routing security in ad hoc networks', Seminar on Network Security, pp.1-12.
-
(2000)
Seminar on Network Security
, pp. 1-12
-
-
Lundberg, J.1
-
22
-
-
0003695238
-
-
McGraw-Hill Ch. 3 New York. ns-2.34 2011) The Network Simulator, Last accessed 13 September 2011
-
Milton, S.J. and Arnold, J.C. (2003) Introduction to Probability and Statistics: Principles and Applications for Engineering and the Computing Sciences, McGraw-Hill, Ch. 3, New York. ns-2.34 (2011) The Network Simulator, http://www.isi.edu/nsnam/ns, Last accessed 13 September, 2011.
-
(2003)
Introduction to Probability and Statistics: Principles and Applications for Engineering and the Computing Sciences
-
-
Milton, S.J.1
Arnold, J.C.2
-
23
-
-
0003843664
-
-
IETF, Last accessed 7 February 2012
-
Perkins, C., Belding-Royer, E. and Das, S. (2003) Ad hoc On-Demand Distance Vector (AODV) Routing RFC-3561, IETF, Last accessed 7 February, 2012.
-
(2003)
Ad Hoc On-Demand Distance Vector (AODV) Routing RFC-3561
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
24
-
-
84899795868
-
-
Rice Monarch Project, Last accessed September 13 2011
-
Rice Monarch Project (2000) Implementation of DSR, http://www.monarch.cs. rice.edu/dsr-impl.html, Last accessed September 13, 2011.
-
(2000)
Implementation of DSR
-
-
-
26
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B.N., Shields, C. and Belding-Royer, E.M. (2005) ̀Authenticated routing for ad hoc networks', IEEE Journal on Selected Areas in Communications, Vol. 23, No. 3, pp.598-610.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
Laflamme, D.2
Dahill, B.3
Levine, B.N.4
Shields, C.5
Belding-Royer, E.M.6
-
27
-
-
84899792641
-
-
Last accessed September 13 2011
-
Song, A. (2009) picoNet, http://sourceforge.net/projects/piconet/. Last accessed September 13, 2011.
-
(2009)
PicoNet
-
-
Song, A.1
-
29
-
-
77949386563
-
A unified analysis of routing protocols in MANETs
-
March 2010
-
Xu, H., Wu, X., Sadjadpour, H.R. and Garcia-Luna-Aceves, J.J. (2010) ̀A unified analysis of routing protocols in MANETs', Communications, IEEE Transactions on, Vol. 58, No. 3, pp.911-922, March 2010.
-
(2010)
Communications, IEEE Transactions on
, vol.58
, Issue.3
, pp. 911-922
-
-
Xu, H.1
Wu, X.2
Sadjadpour, H.R.3
Garcia-Luna-Aceves, J.J.4
-
30
-
-
6344271642
-
Security vulnerabilities in ad hoc networks
-
Ambleside, UK
-
Yau, P. and Mitchell, C. (2003) ̀Security vulnerabilities in ad hoc networks', Proceedings of the 7th International Symposium on Communication Theory and Applications, Ambleside, UK, pp.99-104.
-
(2003)
Proceedings of the 7th International Symposium on Communication Theory and Applications
, pp. 99-104
-
-
Yau, P.1
Mitchell, C.2
-
31
-
-
77958595650
-
An open architecture for the routing protocols design in ad hoc networks
-
Zhan, S., Peng, Y., Yang, Y. and Li, J. (2010) 'An open architecture for the routing protocols design in ad hoc networks', IEEE International Conference on Computer Science and Information Technology, pp.18-22.
-
(2010)
IEEE International Conference on Computer Science and Information Technology
, pp. 18-22
-
-
Zhan, S.1
Peng, Y.2
Yang, Y.3
Li, J.4
|