-
1
-
-
62249186737
-
On address privacy in mobile ad hoc networks
-
February
-
Yanchao Zhang and Kui Ren, "On Address Privacy in Mobile Ad Hoc Networks, " Mobile Network Applications, vol. 14, no. 2, pp. 188-197, February 2009.
-
(2009)
Mobile Network Applications
, vol.14
, Issue.2
, pp. 188-197
-
-
Zhang, Y.1
Ren, K.2
-
4
-
-
85024283108
-
-
IETF IETF, California, Standard
-
IETF, "RFC 2828, " IETF, California, Standard 2000.
-
(2000)
RFC 2828
-
-
-
6
-
-
36849010124
-
A survey on attacks and countermeasures in mobile ad hoc networks
-
Yang Xiao, XueminSherman Shen, and Ding-Zhu Du, Eds. USA Springer US ch. 12
-
Jianmin Chen, Jie Wu, Mihaela Cardei Bing Wu, " A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks," in Wireless Network Security, Yang Xiao, XueminSherman Shen, and Ding-Zhu Du, Eds. USA: Springer US, 2007, ch. 12, pp. 103-135.
-
(2007)
Wireless Network Security
, pp. 103-135
-
-
Chen, J.1
Wu, J.2
Cardei, M.3
Wu, B.4
-
7
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
June
-
Hu Yih-Chun and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing , " IEEE Security & Privacy, vol. 2, no. 3, pp. 28-30, June 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.3
, pp. 28-30
-
-
Yih-Chun, H.1
Perrig, A.2
-
8
-
-
84927728096
-
Evaluation of secure routing protocols in mobile ad hoc networks (manets)
-
Levent Ertaul and Dilraba Ibrahim, "Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs), " in Security and Management., 2009, pp. 363-369.
-
(2009)
Security and Management
, pp. 363-369
-
-
Ertaul, L.1
Ibrahim, D.2
-
9
-
-
35248832654
-
A secure manet routing protocol with resilience against byzantine behaviours of malicious or selfish nodes
-
Ontario
-
C. Crepeau, C.R. Davis, and M. Maheswaran, "A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes," in 21st International Conference on Advanced Information Networking and Applications Workshops, AINAW '07, Ontario, 2007, pp. 19-26.
-
(2007)
21st International Conference on Advanced Information Networking and Applications Workshops, AINAW
, vol.7
, pp. 19-26
-
-
Crepeau, C.1
Davis, C.R.2
Maheswaran, M.3
-
10
-
-
52249095096
-
On securing manet routing protocol against control packet dropping
-
Istanbul
-
Dj amel Djenouri, Othmane Mahmoudi, Mohamed Bouamama, David Llewellyn-Jones, and Madjid Merabti, " On Securing MANET Routing Protocol Against Control Packet Dropping," in IEEE International Conference on Pervasive Services, Istanbul, 2007, pp. 100-108.
-
(2007)
IEEE International Conference on Pervasive Services
, pp. 100-108
-
-
Djenouri, D.1
Mahmoudi, O.2
Bouamama, M.3
Llewellyn-Jones, D.4
Merabti, M.5
-
11
-
-
84896916527
-
An efficient secure aodv routing protocol in manet
-
April
-
Durgesh Wadbude and Vineet Richariya, "An Efficient Secure AODV Routing Protocol in MANET, " International Journal of Engineering and Innovative Technology, vol. 1, no. 4, pp. 274-279, April 2012.
-
(2012)
International Journal of Engineering and Innovative Technology
, vol.1
, Issue.4
, pp. 274-279
-
-
Wadbude, D.1
Richariya, V.2
-
12
-
-
84926631617
-
A novel secure routing protocol for manets
-
Xin Wang, Ed. USA: InTech ch. 22
-
Zhongwei Zhang, "A Novel Secure Routing Protocol for MANETs, " in Mobile Ad-Hoc Networks: Protocol Design, Xin Wang, Ed. USA: InTech, 2011, ch. 22, pp. 455-465.
-
Mobile Ad-Hoc Networks: Protocol Design
, vol.2011
, pp. 455-465
-
-
Zhang, Z.1
-
13
-
-
2442582716
-
Secure ad hoc on-demand distance vector routing
-
July
-
Manel Guerrero Zapata, "Secure Ad hoc On-Demand Distance Vector Routing, " Mobile Computing and Communications Review, vol. 6, no. 3, pp. 106-107, July 2002.
-
(2002)
Mobile Computing and Communications Review
, vol.6
, Issue.3
, pp. 106-107
-
-
Zapata, M.G.1
-
14
-
-
0036804761
-
Routing security in wireless ad hoc networks
-
October
-
Hongmei Deng, Wei Li, and Dharma P. Agrawal, " Routing security in wireless ad hoc networks ," IEEE Communications Magazine, vol. 40, no. 10, pp. 70-75, October 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
16
-
-
77953095994
-
Black hole attack in mobile ad hoc networks
-
Huntsville
-
Mohammad Al-Shurman, Seong-Moo Yoo, and Seungjin Park, "Black Hole Attack in Mobile Ad Hoc Networks, " in Proceedings of the 42nd annual Southeast regional conference (ACMSE'04), Huntsville, 2004, pp. 96-97.
-
(2004)
Proceedings of the 42nd Annual Southeast Regional Conference (ACMSE'04)
, pp. 96-97
-
-
Al-Shurman, M.1
Yoo, S.-M.2
Park, S.3
-
17
-
-
84919804566
-
A survey on gray hole attack in manet
-
December
-
V. Shanmuganathan and T. Anand, "A Survey on Gray Hole Attack in MANET, " International Journal of Computer Networks and Wireless Communications, vol. 2, no. 6, pp. 647-650, December 2012.
-
(2012)
International Journal of Computer Networks and Wireless Communications
, vol.2
, Issue.6
, pp. 647-650
-
-
Shanmuganathan, V.1
Anand, T.2
-
18
-
-
84866378369
-
A study on wormhole attacks in manet
-
Reshmi Maulik and Nabendu Chaki, "A Study on Wormhole Attacks in MANET, " International Journal of Computer Information Systems and Industrial Management Applications, vol. 3, no. 1, pp. 271-279, 2011.
-
(2011)
International Journal of Computer Information Systems and Industrial Management Applications
, vol.3
, Issue.1
, pp. 271-279
-
-
Maulik, R.1
Chaki, N.2
-
19
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
Atlanta
-
Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru, and Herbert Rubens, " An On-Demand Secure Routing Protocol Resilient to Byzantine Failures," in Proceedings of the 1st ACM workshop on Wireless Security (WiSe'02), Atlanta, 2002, pp. 21-30.
-
(2002)
Proceedings of the 1st ACM Workshop on Wireless Security (WiSe'02)
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
20
-
-
70749136973
-
Understanding dynamic denial of service attacks in mobile ad hoc networks
-
Washington DC
-
Fei Xing and Wenye Wang, "Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks, " in Military Communications Conference, Washington DC, 2006, pp. 1-7.
-
(2006)
Military Communications Conference
, pp. 1-7
-
-
Xing, F.1
Wang, W.2
-
22
-
-
45749116664
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
Oakland
-
Haifeng Yu, P.B. Gibbons, M. Kaminsky, and Feng Xiao, " SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks," in IEEE Symposium on Security and Privacy (SP 2008), Oakland, 2008, pp. 3-17.
-
(2008)
IEEE Symposium on Security and Privacy (SP 2008)
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
23
-
-
83455177977
-
A sybil attack detection approach using neighboring vehicles in vanet
-
Sydney
-
J. Grover, M. S. Gaur, V. Laxmi, and N. K. Prajapati, " A sybil attack detection approach using neighboring vehicles in VANET," in Proceedings of the 4th international conference on Security of information and networks, Sydney, 2011, pp. 151-158.
-
(2011)
Proceedings of the 4th International Conference on Security of Information and Networks
, pp. 151-158
-
-
Grover, J.1
Gaur, M.S.2
Laxmi, V.3
Prajapati, N.K.4
-
24
-
-
24144437206
-
How to misuse aodv: A case study of insider attacks against mobile ad-hoc routing protocols
-
P. Ning and K. Sun, " How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols," Ad Hoc Networks, vol. 3, pp. 795-819, 2005.
-
(2005)
Ad Hoc Networks
, vol.3
, pp. 795-819
-
-
Ning, P.1
Sun, K.2
-
25
-
-
39149127588
-
Cryptographic versus trust-based methods for manet routing security
-
J. Cordasco and S. Wetzel, "Cryptographic Versus Trust-based Methods for MANET Routing Security, " Electronic Notes in Theoritical Computer Science, vol. 197, pp. 131-140, 2008.
-
(2008)
Electronic Notes in Theoritical Computer Science
, vol.197
, pp. 131-140
-
-
Cordasco, J.1
Wetzel, S.2
-
26
-
-
84886593344
-
Trust-based routing mechanism in manet: Design and implementation
-
October
-
T. Eissa, S. Abdul Razak, R.H. Khokhar, and N. Samian, " Trust-Based Routing Mechanism in MANET: Design and Implementation," Mobile Networks and Applications, vol. 18, no. 5, pp. 666-677, October 2013.
-
(2013)
Mobile Networks and Applications
, vol.18
, Issue.5
, pp. 666-677
-
-
Eissa, T.1
Abdul Razak, S.2
Khokhar, R.H.3
Samian, N.4
-
27
-
-
80053983111
-
Secrecy throughput of manets under passive and active attacks
-
October
-
Yingbin Liang, H. Vincent Poor, and Lei Ying, "Secrecy Throughput of MANETs Under Passive and Active Attacks, " IEEE TRANSACTIONS ON INFORMATION THEORY, vol. 57, no. 10, pp. 6692-7002, October 2011.
-
(2011)
IEEE Transactions on Information Theory
, vol.57
, Issue.10
, pp. 6692-7002
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
28
-
-
84893746847
-
A probabilistic framework for jammer identification in manets
-
March
-
Massimiliano Albanesea, Alessandra De Benedictis, Sushil Jajodia, and Don Torrieric, " A probabilistic framework for jammer identification in MANETs, " Ad Hoc Networks, vol. 14, pp. 84-94, March 2014.
-
(2014)
Ad Hoc Networks
, vol.14
, pp. 84-94
-
-
Albanesea, M.1
De Benedictis, A.2
Jajodia, S.3
Torrieric, D.4
-
30
-
-
84869436437
-
Evaluating resistance to jamming and casual interception in mobile wireless networks
-
Paphos
-
Lucia Gallina, Gian-Luca, Marin, Andrea Dei Rossi, and Sabina Rossi, " Evaluating resistance to jamming and casual interception in mobile wireless networks," in Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems (MSWiM '12), Paphos, 2012, pp. 151-158.
-
(2012)
Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM '12)
, pp. 151-158
-
-
Gallina, L.1
Marin, G.-L.2
Dei Rossi, A.3
Rossi, S.4
-
31
-
-
79955059662
-
Detection and preve ntion of denial of service (dos) attacks in mobile ad hoc networks using reputation-based incentive scheme
-
Mieso K. Denko, "Detection and Preve ntion of Denial of Service (DoS) Attacks in Mobile Ad Hoc Networks using Reputation-Based Incentive Scheme," Journal of Systemics, Cybernetics and Informatics, vol. 3, no. 4, pp. 1-9, 2005.
-
(2005)
Journal of Systemics, Cybernetics and Informatics
, vol.3
, Issue.4
, pp. 1-9
-
-
Denko, M.K.1
-
32
-
-
47249164736
-
Detecting black hole attacks in tactical manets using topology graphs
-
Dublin
-
E. Gerhards-Padilla, N. Aschenbruck, P. Martini, M. Jahnke, and J. Tolle, " Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs," in 32nd IEEE Conference on Local Computer Networks (LCN 2007), Dublin, 2007, pp. 1043-1052.
-
(2007)
32nd IEEE Conference on Local Computer Networks (LCN 2007)
, pp. 1043-1052
-
-
Gerhards-Padilla, E.1
Aschenbruck, N.2
Martini, P.3
Jahnke, M.4
Tolle, J.5
-
33
-
-
84929088754
-
Qos of manet through trust based aodv routing protocol by exclusion of black hole attack
-
R.K. Bar, J.K. Mandal, and M.M. Singh, " QoS of MANet Through Trust Based AODV Routing Protocol by Exclusion of Black Hole Attack," in Proceedings of International Conference on Computational Intelligence: Modeling Techniques and Applications, 2013, pp. 530-537.
-
Proceedings of International Conference on Computational Intelligence: Modeling Techniques and Applications
, vol.2013
, pp. 530-537
-
-
Bar, R.K.1
Mandal, J.K.2
Singh, M.M.3
-
37
-
-
80053537536
-
Forced collision: Detecting wormhole attacks with physical layer network coding
-
October
-
Di Pu Zhiwei Li, Weichao Wang, and Alex Wyglinski, " Forced Collision: Detecting Wormhole Attacks with Physical Layer Network Coding," TSINGHUA SCIENCE AND TECHNOLOGY, vol. 16, no. 5, pp. 505-519, October 2011.
-
(2011)
Tsinghua Science and Technology
, vol.16
, Issue.5
, pp. 505-519
-
-
Zhiwei Li, D.P.1
Wang, W.2
Wyglinski, A.3
-
38
-
-
84927765785
-
A wormhole attack resistant neighbor discovery scheme with rdma protocol for 60 ghz directional network
-
December
-
Z. Shi et al., " A Wormhole Attack Resistant Neighbor Discovery Scheme With RDMA Protocol for 60 GHz Directional Network," IEEE Transactions on Emerging Topics in Computing, vol. 1, no. 2, pp. 341-352, December 2013.
-
(2013)
IEEE Transactions on Emerging Topics in Computing
, vol.1
, Issue.2
, pp. 341-352
-
-
Shi, Z.1
-
40
-
-
77957949158
-
On the vulnerabilities and protections of the olsr ad hoc routing protocol from the point of view of trust
-
September
-
R. T. De Souza Jr. , A. H. Adnane, C. Bidan, and L. Mé, " On the Vulnerabilities and Protections of the OLSR ad hoc Routing Protocol from the point of view of Trust," IEEE Latin America Transactions, vol. 7, no. 5, pp. 594-602, September 2009.
-
(2009)
IEEE Latin America Transactions
, vol.7
, Issue.5
, pp. 594-602
-
-
De Souza, R.T.1
Adnane, A.H.2
Bidan, C.3
Mé, L.4
-
41
-
-
84888646473
-
An intrusion detection & adaptive response mechanism for manets
-
February
-
A. Nadeem and M.P. Howrath, "An intrusion detection & adaptive response mechanism for MANETs, " Ad Hoc Networks, vol. 13, no. B, pp. 368-380, February 2014.
-
(2014)
Ad Hoc Networks
, vol.13
, Issue.B
, pp. 368-380
-
-
Nadeem, A.1
Howrath, M.P.2
-
43
-
-
49649115473
-
Opening the pandora's box: Exploring the fundamental limitations of designing intrusion detection for manet routing attacks
-
J.F.C. Joseph, A. Das, B. Seet, and B. Lee, " Opening the Pandora's Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks, " Computer Communications, vol. 31, pp. 3178-3189, 2008.
-
(2008)
Computer Communications
, vol.31
, pp. 3178-3189
-
-
Joseph, J.F.C.1
Das, A.2
Seet, B.3
Lee, B.4
|