-
3
-
-
84892664421
-
-
Boca Raton, FL, USA: CRC
-
J. Loo, J. Lloret, and J. H. Ortiz, Mobile Ad Hoc Networks: Current Status and Future Trends. Boca Raton, FL, USA: CRC, 2011.
-
(2011)
Mobile Ad Hoc Networks: Current Status and Future Trends
-
-
Loo, J.1
Lloret, J.2
Ortiz, J.H.3
-
4
-
-
84863962542
-
Joint topology control and authentication design in mobile ad hoc networks with cooperative communications
-
Jul.
-
Q. Guan, F. R. Yu, S. Jiang, and V. Leung, "Joint topology control and authentication design in mobile ad hoc networks with cooperative communications," IEEE Trans. Veh. Tech., vol. 61, no. 6, pp. 2674-2685, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Tech.
, vol.61
, Issue.6
, pp. 2674-2685
-
-
Guan, Q.1
Yu, F.R.2
Jiang, S.3
Leung, V.4
-
5
-
-
84894179025
-
Security and Quality of Service (QoS) co-design in cooperative mobile ad hoc networks
-
Jul.
-
F. R. Yu, H. Tang, S. Bu, and D. Zheng, "Security and Quality of Service (QoS) co-design in cooperative mobile ad hoc networks," EURASIP J. Wireless Commun. Netw., vol. 2013, pp. 188-190, Jul. 2013.
-
(2013)
EURASIP J. Wireless Commun. Netw.
, vol.2013
, pp. 188-190
-
-
Yu, F.R.1
Tang, H.2
Bu, S.3
Zheng, D.4
-
6
-
-
84897912432
-
A mean field game theoretic approach for security enhancements in mobile ad hoc networks
-
Mar.
-
Y. Wang, F. R. Yu, H. Tang, and M. Huang, "A mean field game theoretic approach for security enhancements in mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1616-1627, Mar. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.3
, pp. 1616-1627
-
-
Wang, Y.1
Yu, F.R.2
Tang, H.3
Huang, M.4
-
7
-
-
84856962285
-
The next 10 years of DoD wireless networking research
-
Nov.
-
J. Chapin and V.W. Chan, "The next 10 years of DoD wireless networking research," in Proc. IEEE Milcom, Nov. 2011, pp. 2155-2245.
-
(2011)
Proc. IEEE Milcom
, pp. 2155-2245
-
-
Chapin, J.1
Chan, V.W.2
-
8
-
-
79952830393
-
Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks
-
Mar.
-
S. Bu, F. R. Yu, P. Liu, P. Manson, and H. Tang, "Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks," IEEE Trans. Veh. Technol., vol. 60, no. 3, pp. 1025-1036, Mar. 2011.
-
(2011)
IEEE Trans. Veh. Technol.
, vol.60
, Issue.3
, pp. 1025-1036
-
-
Bu, S.1
Yu, F.R.2
Liu, P.3
Manson, P.4
Tang, H.5
-
9
-
-
34247520820
-
Attacks against OLSR: Distributed key management for security
-
Palaiseau, France, Dec.
-
C. Adjih, D. Raffo, and P. Muhlethaler, "Attacks against OLSR: Distributed key management for security," presented at the 2nd OLSR Interop/Workshop, Palaiseau, France, Dec., 2005.
-
(2005)
Presented at the 2nd OLSR Interop/Workshop
-
-
Adjih, C.1
Raffo, D.2
Muhlethaler, P.3
-
10
-
-
33751529199
-
Securing mobile ad hoc networks with certificateless public keys
-
Oct.-Dec.
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Trans. Dependable Secure Comput., vol. 3, no. 4, pp. 386-399, Oct.-Dec. 2006.
-
(2006)
IEEE Trans. Dependable Secure Comput.
, vol.3
, Issue.4
, pp. 386-399
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
11
-
-
67349212443
-
Securing resource-constrained wireless ad hoc networks
-
Apr.
-
Y. Fang, X. Zhu, and Y. Zhang, "Securing resource-constrained wireless ad hoc networks," IEEE Wireless Comm., vol. 16, no. 2, pp. 24-30, Apr. 2009.
-
(2009)
IEEE Wireless Comm.
, vol.16
, Issue.2
, pp. 24-30
-
-
Fang, Y.1
Zhu, X.2
Zhang, Y.3
-
12
-
-
85008009601
-
A hierarchical identity based key management scheme in tactical mobile ad hoc networks
-
Dec.
-
F. R. Yu, H. Tang, P. Mason, and F. Wang, "A hierarchical identity based key management scheme in tactical mobile ad hoc networks," IEEE Trans. Netw. Serv. Manag., vol. 7, no. 4, pp. 258-267, Dec. 2010.
-
(2010)
IEEE Trans. Netw. Serv. Manag.
, vol.7
, Issue.4
, pp. 258-267
-
-
Yu, F.R.1
Tang, H.2
Mason, P.3
Wang, F.4
-
13
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Aug.
-
S. Marti, T. Giuli, K. Lai, and M. Maker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. ACM MobiCom, Aug. 2000, pp. 255-265.
-
(2000)
Proc. ACM MobiCom
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Maker, M.4
-
14
-
-
60049091288
-
SPREAD: Improving network security by multipath routing in mobile ad hoc networks
-
Apr.
-
W. Lou, W. Liu, Y. Zhang, and Y. Fang, "SPREAD: Improving network security by multipath routing in mobile ad hoc networks," ACM Wireless Netw., vol. 15, no. 3, pp. 279-294, Apr. 2009.
-
(2009)
ACM Wireless Netw.
, vol.15
, Issue.3
, pp. 279-294
-
-
Lou, W.1
Liu, W.2
Zhang, Y.3
Fang, Y.4
-
15
-
-
79956131066
-
AOS: An anonymous overlay system for mobile ad hoc networks
-
May
-
R. Zhang, Y. Zhang, and Y. Fang, "AOS: An anonymous overlay system for mobile ad hoc networks," ACM Wireless Netw., vol. 17, no. 4, pp. 843-859, May 2011.
-
(2011)
ACM Wireless Netw.
, vol.17
, Issue.4
, pp. 843-859
-
-
Zhang, R.1
Zhang, Y.2
Fang, Y.3
-
16
-
-
21644434924
-
Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches
-
Ciudad Real, Spain, Apr.
-
P. Albers, O. Camp, J.-M. Percher, B. Jouga, and L. M. R. S. Puttini, "Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches," presented at the 1st Int. Workshop Wireless Inf. Syst., Ciudad Real, Spain, Apr. 2002.
-
(2002)
Presented at the 1st Int. Workshop Wireless Inf. Syst.
-
-
Albers, P.1
Camp, O.2
Percher, J.-M.3
Jouga, B.4
Puttini, L.M.R.S.5
-
17
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
Feb.
-
A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," IEEE Wireless Comm., vol. 11, no. 1, pp. 48-60, Feb. 2004.
-
(2004)
IEEE Wireless Comm.
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
18
-
-
80052948907
-
Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks
-
Sep.
-
S. Bu, F. R. Yu, X. P. Liu, and H. Tang, "Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks," IEEE Trans. Wireless Commun., vol. 10, no. 9, pp. 3064-3073, Sep. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.9
, pp. 3064-3073
-
-
Bu, S.1
Yu, F.R.2
Liu, X.P.3
Tang, H.4
-
20
-
-
33745940320
-
A quantitative trust establishment framework for reliable data packet delivery in MANETs
-
Nov.
-
C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "A quantitative trust establishment framework for reliable data packet delivery in MANETs," in Proc. 3rd ACM Workshop SASN, Nov. 2005, pp. 1-10.
-
(2005)
Proc. 3rd ACM Workshop SASN
, pp. 1-10
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
-
21
-
-
2442597363
-
Performance analysis of the confidant protocol
-
Jun.
-
S. Buchegger and J.-Y. L. Boudec, "Performance analysis of the confidant protocol," in Proc. ACM MobiHoc, Jun. 2002, pp. 226-236.
-
(2002)
Proc. ACM MobiHoc
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
22
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Feb.
-
Y. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 305-317, Feb. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
25
-
-
0036362188
-
An evidential model of distributed reputation management
-
Jul.
-
B. Yu and M. P. Singh, "An evidential model of distributed reputation management," in Proc. ACM AAMAS, Jul. 2002, pp. 294-301.
-
(2002)
Proc. ACM AAMAS
, pp. 294-301
-
-
Yu, B.1
Singh, M.P.2
-
26
-
-
0036051055
-
Sensor fusion using Dempster-Shafer theory
-
May
-
H. Wu, M. Siegel, R. Stiefelhagen, and J. Yang, "Sensor fusion using Dempster-Shafer theory," in Proc. IEEE Instrumen. Meas. Technol. Conf., May 2002, pp. 7-12.
-
(2002)
Proc. IEEE Instrumen. Meas. Technol. Conf.
, pp. 7-12
-
-
Wu, H.1
Siegel, M.2
Stiefelhagen, R.3
Yang, J.4
-
28
-
-
84857844113
-
A survey on trust management for mobile ad hoc networks
-
Fourth Quarter
-
J. H. Cho, A. Swami, and I. R. Chen, "A survey on trust management for mobile ad hoc networks," IEEE Commun. Surv. Tuts., vol. 13, no. 4, pp. 562-583, Fourth Quarter, 2011.
-
(2011)
IEEE Commun. Surv. Tuts.
, vol.13
, Issue.4
, pp. 562-583
-
-
Cho, J.H.1
Swami, A.2
Chen, I.R.3
-
29
-
-
30144440941
-
Dempster-Shafer theory for intrusion detection in ad hoc networks
-
Nov./Dec.
-
T. M. Chen and V. Venkataramanan, "Dempster-Shafer theory for intrusion detection in ad hoc networks," IEEE Internet Comput., vol. 9, no. 6, pp. 35-41, Nov./Dec. 2005.
-
(2005)
IEEE Internet Comput.
, vol.9
, Issue.6
, pp. 35-41
-
-
Chen, T.M.1
Venkataramanan, V.2
-
30
-
-
84908332173
-
Trust establishment in cooperative wireless relaying networks
-
Sep.
-
R. Changiz, H. Halabian, F. R. Yu, I. Lambadaris, and H. Tang, "Trust establishment in cooperative wireless relaying networks," Wireless Commun. Mobile Comput., Sep. 2012, doi: 10.1002/wcm.2271.
-
(2012)
Wireless Commun. Mobile Comput.
-
-
Changiz, R.1
Halabian, H.2
Yu, F.R.3
Lambadaris, I.4
Tang, H.5
-
31
-
-
79951868603
-
Building a trust-aware dynamic routing solution for wireless sensor neworks
-
Dec.
-
H. Deng, Y. Yang, G. Jin, R. Xu, and W. Shi, "Building a trust-aware dynamic routing solution for wireless sensor neworks," in Proc. IEEE GLOBECOM Workshop, Dec. 2010, pp. 153-157.
-
(2010)
Proc. IEEE GLOBECOM Workshop
, pp. 153-157
-
-
Deng, H.1
Yang, Y.2
Jin, G.3
Xu, R.4
Shi, W.5
-
32
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks
-
Oct.
-
S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proc. ACM SASN, Oct. 2004, pp. 66-77.
-
(2004)
Proc. ACM SASN
, pp. 66-77
-
-
Ganeriwal, S.1
Srivastava, M.B.2
-
33
-
-
51349155690
-
On datacentric trust establishment in ephemeral ad hoc networks
-
Mar.
-
M. Raya, P. Papadimitratos, V. D. Gligor, and J.-P. Hubaux, "On datacentric trust establishment in ephemeral ad hoc networks," in Proc. IEEE INFOCOM, Mar. 2008, pp. 1-11.
-
(2008)
Proc. IEEE INFOCOM
, pp. 1-11
-
-
Raya, M.1
Papadimitratos, P.2
Gligor, V.D.3
Hubaux, J.-P.4
-
34
-
-
79951599667
-
Trust establishment in cooperative wireless networks
-
Nov.
-
R. Changiz, H. Halabian, F. R. Yu, I. Lambadaris, H. Tang, and P. Mason, "Trust establishment in cooperative wireless networks," in Proc. IEEE MILCOM, Nov. 2010, pp. 1074-1079.
-
(2010)
Proc. IEEE MILCOM
, pp. 1074-1079
-
-
Changiz, R.1
Halabian, H.2
Yu, F.R.3
Lambadaris, I.4
Tang, H.5
Mason, P.6
-
37
-
-
84909637411
-
Securing the OLSR protocol
-
Mahdia, Tunisia, Jun.
-
C. Adjih, T. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler, and D. Raffo, "Securing the OLSR protocol," presented at the 2nd IFIP Annual Mediterranean Ad Hoc Networking Workshop, Mahdia, Tunisia, Jun. 2008.
-
(2008)
Presented at the 2nd IFIP Annual Mediterranean Ad Hoc Networking Workshop
-
-
Adjih, C.1
Clausen, T.2
Jacquet, P.3
Laouiti, A.4
Muhlethaler, P.5
Raffo, D.6
-
38
-
-
84881131647
-
Vulnerability analysis of the optimized link state routing protocol version 2 (OLSRv2)
-
Feb.
-
T. Clausen and U. Herberg, "Vulnerability analysis of the Optimized Link State Routing Protocol version 2 (OLSRv2)," in Proc. IEEE WCNIS, Feb. 2010, pp. 628-633.
-
(2010)
Proc. IEEE WCNIS
, pp. 628-633
-
-
Clausen, T.1
Herberg, U.2
-
39
-
-
0036804761
-
Routing security in wireless ad hoc networks
-
Oct.
-
H. Deng, W. Li, and D. Agrawal, "Routing security in wireless ad hoc networks," IEEE Commun. Mag., vol. 40, no. 10, pp. 70-75, Oct. 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.3
-
40
-
-
77956948315
-
A survey on trust and reputation management systems in wireless communications
-
Oct.
-
H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, "A survey on trust and reputation management systems in wireless communications," Proc. IEEE, vol. 98, no. 10, pp. 1755-1772, Oct. 2010.
-
(2010)
Proc. IEEE
, vol.98
, Issue.10
, pp. 1755-1772
-
-
Yu, H.1
Shen, Z.2
Miao, C.3
Leung, C.4
Niyato, D.5
-
41
-
-
84863586452
-
Light-weight trust-based routing protocol for mobile ad-hoc networks
-
Jun.
-
N. Marchang and R. Datta, "Light-weight trust-based routing protocol for mobile ad-hoc networks," IET Inf. Security, vol. 6, no. 2, pp. 77-83, Jun. 2012.
-
(2012)
IET Inf. Security
, vol.6
, Issue.2
, pp. 77-83
-
-
Marchang, N.1
Datta, R.2
-
42
-
-
36849093903
-
OLSRv2 implementation and performance evaluation with link layer feedback
-
Aug.
-
Y. Owada, T. Maeno, and H. Imai, "OLSRv2 implementation and performance evaluation with link layer feedback," in Proc. ACM IWCMC, Aug. 2007, pp. 67-72.
-
(2007)
Proc. ACM IWCMC
, pp. 67-72
-
-
Owada, Y.1
Maeno, T.2
Imai, H.3
-
44
-
-
84881165884
-
-
[Online]
-
Trust platform module. [Online]. Available: http://www.trustedcomputinggroup.org/
-
Trust Platform Module
-
-
-
45
-
-
77952492719
-
Biologically inspired consensus-based spectrum sensing in mobile ad hoc networks with cognitive radios
-
May
-
F. R. Yu, M. Huang, and H. Tang, "Biologically inspired consensus-based spectrum sensing in mobile ad hoc networks with cognitive radios," IEEE Netw., vol. 24, no. 3, pp. 26-30, May 2010.
-
(2010)
IEEE Netw.
, vol.24
, Issue.3
, pp. 26-30
-
-
Yu, F.R.1
Huang, M.2
Tang, H.3
|