-
1
-
-
2442551009
-
Optimized Link State Routing Protocol (OLSR)
-
T. Clausen, P. Jacquet, Optimized Link State Routing Protocol (OLSR), in: IETF RFC3626, 2003, pp. 1-75.
-
(2003)
IETF RFC3626
, pp. 1-75
-
-
Clausen, T.1
Jacquet, P.2
-
2
-
-
84875465579
-
Enhanced OLSR for defense against DOS attack in ad hoc networks
-
M. Marimuthu, and I. Krishnamurthi Enhanced OLSR for defense against DOS attack in ad hoc networks J. Commun. Networks 15 2013 31 37
-
(2013)
J. Commun. Networks
, vol.15
, pp. 31-37
-
-
Marimuthu, M.1
Krishnamurthi, I.2
-
3
-
-
74049083117
-
-
IETF RFC7181
-
T. Clausen, C. Dearlove, P. Jacquet, The Optimized Link State Routing Protocol Version 2, IETF RFC7181, 2014, pp. 1-115.
-
(2014)
The Optimized Link State Routing Protocol Version 2
, pp. 1-115
-
-
Clausen, T.1
Dearlove, C.2
Jacquet, P.3
-
5
-
-
80052184498
-
A framework for packet-droppers mitigation in OLSR wireless community networks
-
Francesco Saverio Proto, and Andrea Detti A framework for packet-droppers mitigation in OLSR wireless community networks IEEE Int. Conf. Commun. (ICC) 2011 1 6
-
(2011)
IEEE Int. Conf. Commun. (ICC)
, pp. 1-6
-
-
Proto, F.S.1
Detti, A.2
-
6
-
-
34247506368
-
Analysis of the node isolation attack against OLSR-based mobile ad hoc networks
-
Bounpadith Kannhavong, and Hidehisa Nakayama Analysis of the node isolation attack against OLSR-based mobile ad hoc networks Int. Symp. Comput. Networks 2006 30 35
-
(2006)
Int. Symp. Comput. Networks
, pp. 30-35
-
-
Kannhavong, B.1
Nakayama, H.2
-
7
-
-
84880874867
-
Survey of routing attacks and countermeasures in mobile ad hoc networks
-
A.K. Abdelaziz, M. Nafaa, G. Salim, Survey of routing attacks and countermeasures in mobile ad hoc networks, in: 15th International Conference on Computer Modelling and Simulation (UKSim), 2013, pp. 693-698.
-
(2013)
15th International Conference on Computer Modelling and Simulation (UKSim)
, pp. 693-698
-
-
Abdelaziz, A.K.1
Nafaa, M.2
Salim, G.3
-
8
-
-
66649101050
-
On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks
-
M.N.K. Babu, A.A. Franklin, C. Siva Ram Murthy, On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks, in: 16th IEEE International Conference on Networks (ICON), 2008, pp. 1-6.
-
(2008)
16th IEEE International Conference on Networks (ICON)
, pp. 1-6
-
-
Babu, M.N.K.1
Franklin, A.A.2
Siva Ram Murthy, C.3
-
9
-
-
84891936588
-
Broadcast encryption based non-interactive key distribution in MANETs
-
533-545
-
Y. Yang Broadcast encryption based non-interactive key distribution in MANETs J Comput Syst Sci 2014 80; 533 545
-
(2014)
J Comput Syst Sci
, pp. 80
-
-
Yang, Y.1
-
10
-
-
84893132480
-
A cryptographybased protocol against packet dropping and message tampering attacks on mobile ad hoc networks
-
S. Obaidat M, I. Woungang, and S.K. Dhurandher A cryptographybased protocol against packet dropping and message tampering attacks on mobile ad hoc networks Secur. Commun. Networks 7 2014 376 384
-
(2014)
Secur. Commun. Networks
, vol.7
, pp. 376-384
-
-
Obaidat, M.S.1
Woungang, I.2
Dhurandher, S.K.3
-
12
-
-
77950567366
-
Defending against Node misbehavior to discover secure route in OLSR
-
Sanjeev Rana, and Anil Kapil Defending against Node misbehavior to discover secure route in OLSR Commun. Comput. Inf. Sci. 70 2010 430 436
-
(2010)
Commun. Comput. Inf. Sci.
, vol.70
, pp. 430-436
-
-
Rana, S.1
Kapil, A.2
-
13
-
-
84856423051
-
RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks
-
J.M. Robert, H. Otrok, and A. Chriqi RBC-OLSR: reputation-based clustering OLSR protocol for wireless ad hoc networks Comput. Commun. 35 2012 487 499
-
(2012)
Comput. Commun.
, vol.35
, pp. 487-499
-
-
Robert, J.M.1
Otrok, H.2
Chriqi, A.3
-
14
-
-
84878352310
-
Trust-based security for the OLSR routing protocol
-
Asma Adnane, and Christophe Bidan Trust-based security for the OLSR routing protocol Comput. Commun. 36 2013 1159 1171
-
(2013)
Comput. Commun.
, vol.36
, pp. 1159-1171
-
-
Adnane, A.1
Bidan, C.2
-
17
-
-
34548043694
-
Trust-based security for wireless ad hoc and sensor networks
-
A. Boukerch, L. Xu, and K. El-Khatib Trust-based security for wireless ad hoc and sensor networks Comput. Commun. 11 2007 2413 2427
-
(2007)
Comput. Commun.
, vol.11
, pp. 2413-2427
-
-
Boukerch, A.1
Xu, L.2
El-Khatib, K.3
-
18
-
-
80052880154
-
Autonomic trust management for a component-based software system
-
Z. Yan, and P. Christian Autonomic trust management for a component-based software system IEEE Trans. Dependable Secure Comput. 8 2011 810 823
-
(2011)
IEEE Trans. Dependable Secure Comput.
, vol.8
, pp. 810-823
-
-
Yan, Z.1
Christian, P.2
-
19
-
-
42149154466
-
Integrating trust reasonings into node behavior in olsr
-
Asmaa Adnane, R. de Sousa Jr., C. Bidan, et al., Integrating trust reasonings into node behavior in olsr, in: Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, 2007, pp. 152-155.
-
(2007)
Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks
, pp. 152-155
-
-
Adnane, A.1
De Sousa, Jr.R.2
Bidan, C.3
-
20
-
-
84865687679
-
Formal specification of trusted neighbor information base of OLSR routing protocol of adhoc network using Z language
-
A. Verma, and S. Gujral M Formal specification of trusted neighbor information base of OLSR routing protocol of adhoc network using Z language Global Trends Comput. Commun. Syst. 2012 560 570
-
(2012)
Global Trends Comput. Commun. Syst.
, pp. 560-570
-
-
Verma, A.1
Gujral, M.S.2
-
21
-
-
79952502889
-
Misbehavior nodes detection and isolation for MANETs OLSR protocol
-
A.M. Abdalla, and I.A. Saroit Misbehavior nodes detection and isolation for MANETs OLSR protocol Procedia Comput. Sci. 3 2011 115 121
-
(2011)
Procedia Comput. Sci.
, vol.3
, pp. 115-121
-
-
Abdalla, A.M.1
Saroit, I.A.2
-
22
-
-
84885300345
-
On the tradeoff between altruism and selfishness in MANET trust management
-
J.H. Cho, and I.R. Chen On the tradeoff between altruism and selfishness in MANET trust management Ad Hoc Netw. 11 2013 2217 2234
-
(2013)
Ad Hoc Netw.
, vol.11
, pp. 2217-2234
-
-
Cho, J.H.1
Chen, I.R.2
-
23
-
-
84877998022
-
A credible routing based on a novel trust mechanism in ad hoc networks
-
R. Feng, and S. Che A credible routing based on a novel trust mechanism in ad hoc networks Int. J. Distrib. Sens. Netw. 2013 10.1155/2013/652051
-
(2013)
Int. J. Distrib. Sens. Netw.
-
-
Feng, R.1
Che, S.2
-
24
-
-
84883463898
-
Trust prediction and trust-based source routing in mobile ad hoc networks
-
Hui Xia, and Z. Jia Trust prediction and trust-based source routing in mobile ad hoc networks Ad Hoc Netw. 11 2013 2096 2114
-
(2013)
Ad Hoc Netw.
, vol.11
, pp. 2096-2114
-
-
Xia, H.1
Jia, Z.2
-
25
-
-
84877695525
-
Impact of trust model on on-demand multi-path routing in mobile ad hoc networks
-
Hui Xia, and Zhiping Jia Impact of trust model on on-demand multi-path routing in mobile ad hoc networks Comput. Commun. 36 2013 1078 1093
-
(2013)
Comput. Commun.
, vol.36
, pp. 1078-1093
-
-
Xia, H.1
Jia, Z.2
-
26
-
-
78650394299
-
Trust-based on-demand multipath routing in mobile ad hoc networks
-
X. Li, Z. Jia, and P. Zhang Trust-based on-demand multipath routing in mobile ad hoc networks IET Inf. Secur. 4 2010 212 232
-
(2010)
IET Inf. Secur.
, vol.4
, pp. 212-232
-
-
Li, X.1
Jia, Z.2
Zhang, P.3
-
27
-
-
0032627201
-
A fuzzy Petri net-based expert system and its application to damage assessment of bridges
-
J. Lee, R. Liu K F, and W. Chiang A fuzzy Petri net-based expert system and its application to damage assessment of bridges IEEE Trans. Syst. Man Cybern.-Part B: Cybern. 29 1999 350 370
-
(1999)
IEEE Trans. Syst. Man Cybern.-Part B: Cybern.
, vol.29
, pp. 350-370
-
-
Lee, J.1
Liu, K.F.R.2
Chiang, W.3
-
28
-
-
1842421851
-
Fuzzy Petri net based formalized reasoning algorithm with applications
-
L.X. Jia, J.Y. Xun, and F. Ru Fuzzy Petri net based formalized reasoning algorithm with applications J. Xian Jiaotong Univ. 37 2003 1263 1266
-
(2003)
J. Xian Jiaotong Univ.
, vol.37
, pp. 1263-1266
-
-
Jia, L.X.1
Xun, J.Y.2
Ru, F.3
-
29
-
-
84888212025
-
Knowledge acquisition and representation using fuzzy evidential reasoning and dynamic adaptive fuzzy Petri nets
-
H.C. Liu, and L. Liu Knowledge acquisition and representation using fuzzy evidential reasoning and dynamic adaptive fuzzy Petri nets IEEE Trans. Cybern. 43 2013 1059 1072
-
(2013)
IEEE Trans. Cybern.
, vol.43
, pp. 1059-1072
-
-
Liu, H.C.1
Liu, L.2
|