Uneingeschränkter Zugang

Security architecture for the mobile ad hoc networks


Zitieren

[1] S. Akram, I. Zubair and M. Islam, ”Fully distributed dynami- cally configurable firewall to resist DOS attacks MANET”, rev. Networked Digital Technologies, 2009, NDT ’09.First International Conference, Ostrava, 2009.10.1109/NDT.2009.5272096Search in Google Scholar

[2] M. K.A. D. ??? Alicherry, ”Distributed Policy Enforcement Ar- chitecture for MANETs”, Diploma work ???.Search in Google Scholar

[3] M. Alicherry, A. Keromytis and A. Stavrou, ”Evaluating a col- laborative defense architecture for MANETs”, Rev. Internet Multimedia Services Architecture and Applications (IMSAA), 2009, IEEE International Conference, Bangalore, 2009.10.1109/IMSAA.2009.5439498Search in Google Scholar

[4] R. Boppana and X. Su, ”On the Effectiveness of Monitoring for Intrusion Detection Mobile Ad Hoc Networks”, 2011.10.1109/TMC.2010.210Search in Google Scholar

[5] A. Boukerche, K. El-Khatib, L. Xu and L. Korba, ”SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks”, 2004.10.1016/j.comcom.2004.07.019Search in Google Scholar

[6] A. Chaudhary, V. Tiwari and A. Kumar, ”Design an anomaly based fuzzy intrusion detection system for packet dropping at- tack mobile ad hoc networks”, Gurgaon, 2014.10.1109/IAdCC.2014.6779330Search in Google Scholar

[7] D. Ismail and M. Jaafar, ”Mobile ad hoc network overview”, Melaka, 2007.10.1109/APACE.2007.4603864Search in Google Scholar

[8] L. Jin, Z. Zhang, D. Lai and H. Zhou, ”Implementing and Eval- uating An Adaptive Secure Routing Protocol for Mobile Ad Hoc Network”, Pomana, CA, 2006.10.1109/WTS.2006.334533Search in Google Scholar

[9] I. Khalil, S. Bataineh, L. Qubajah and A. Khreishah, ”Dis- tributed secure routing protocol for Mobile Ad-Hoc Networks”, Amman, 2013.10.1109/CSIT.2013.6588766Search in Google Scholar

[10] N. Noureldien, ”A novel taxonomy of MANET attacks”, Mar- rakech, 2015.10.1109/EITech.2015.7162947Search in Google Scholar

[11] L. Rajeswari, R. Annie and A. Kannan, ”Enhanced intrusion detection techniques for mobile ad hoc networks”, Tamil Nadu, 2007.10.1049/ic:20070757Search in Google Scholar

[12] S. Saha, R. Chaki and N. Chaki, ”A New Reactive Secure Rout- ing Protocol for Mobile Ad-Hoc Networks”, Ostrava, 2008.10.1109/CISIM.2008.13Search in Google Scholar

[13] B. Sun, L. Osborne, Y. Xiao and S. Guizani, ”Intrusion detection techniques mobile ad hoc and wireless sensor networks”,.Search in Google Scholar

[14] S. Uyyala and D. Naik, ”Anomaly based intrusion detection of packet dropping attacks mobile ad-hoc networks”, Kanyaku- mari, 2014.10.1109/ICCICCT.2014.6993132Search in Google Scholar

[15] B. Vaidya, D. Makrakis and H. Mouftah, ”Provisioning secure on-demand routing protocol mobile ad hoc network”, Kath- mandu, 2011.10.1109/AHICI.2011.6113952Search in Google Scholar

[16] P. Vilhan and L. Hudec, ”Building Public Key Infrastructure for MANET with Help of BATMAN Advanced”, Rev. Modelling Symposium (EMS), 2013 European, Manchester, 2013.10.1109/EMS.2013.94Search in Google Scholar

[17] N. V. Vinh, H. Jun and M.-K. Kim, ”A Self-secure Routing Protocol for Large Mobile Ad hoc Networks”, Singapore, 2007.10.1109/WOCN.2007.4284230Search in Google Scholar

[18] H. Zhao and S. Bellovin, ”High Performance Firewalls MAN-ETs”, Rev. Mobile Ad-hoc and Sensor Networks (MSN), 2010 Sixth International Conference, Hangzhou, 2010.Search in Google Scholar

[19] L. Zhitang and S. Shudong, ”A Secure Routing Protocol for Mobile Ad hoc Networks”, Melbourne, Qld., 2007.10.1109/ICIS.2007.43Search in Google Scholar

[20] D. Watkins and C. Scott, ”Methodology for evaluating the effec- tiveness of intrusion detection tactical mobile ad-hoc networks”, 2004.Search in Google Scholar

[21] J. Filipek and L.Hudec ”Distributed firewall using PKI mo- bile Ad Hoc networks”, Proceedings of the 16-th International Conference on Computer Systems and Technologies, CompSys-Tech’15.Search in Google Scholar

eISSN:
1339-309X
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
6 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Technik, Einführungen und Gesamtdarstellungen, andere