Trust management in mobile wireless networks: Security and survivability

作者: Jiangyi Hu

DOI:

关键词:

摘要:

参考文章(74)
Pietro Michiardi, Refik Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks communications and multimedia security. pp. 107- 121 ,(2002) , 10.1007/978-0-387-35612-9_9
Sergio Marti, T. J. Giuli, Kevin Lai, Mary Baker, Mitigating routing misbehavior in mobile ad hoc networks acm/ieee international conference on mobile computing and networking. pp. 255- 265 ,(2000) , 10.1145/345910.345955
Yih-Chun Hu, D.B. Johnson, A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks workshop on mobile computing systems and applications. pp. 3- 13 ,(2002) , 10.1109/MCSA.2002.1017480
Elizabeth M Royer, Chai-Keong Toh, A review of current routing protocols for ad hoc mobile wireless networks IEEE Personal Communications. ,vol. 6, pp. 46- 55 ,(1999) , 10.1109/98.760423
V.D. Park, M.S. Corson, A highly adaptive distributed routing algorithm for mobile wireless networks international conference on computer communications. ,vol. 3, pp. 1405- 1413 ,(1997) , 10.1109/INFCOM.1997.631180
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M Belding-Royer, A secure routing protocol for ad hoc networks international conference on network protocols. pp. 78- 89 ,(2002) , 10.1109/ICNP.2002.1181388
Levente Buttyán, Jean-Pierre Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks Mobile Networks and Applications. ,vol. 8, pp. 579- 592 ,(2003) , 10.1023/A:1025146013151
J. Marshall, V. Thakur, A. Yasinsac, Identifying flaws in the secure routing protocol international performance computing and communications conference. pp. 167- 174 ,(2003) , 10.1109/PCCC.2003.1203696
Xinjie Chang, Network simulations with OPNET winter simulation conference. ,vol. 1, pp. 307- 314 ,(1999) , 10.1145/324138.324232
Tracy Camp, Jeff Boleng, Vanessa Davies, A survey of mobility models for ad hoc network research communications and mobile computing. ,vol. 2, pp. 483- 502 ,(2002) , 10.1002/WCM.72