Hashing Routing
Abstract
Keywords
Full Text:
PDFReferences
Stallings W. Network and Internetwork Security: Principles and Practice. Englewood Cliffs, NJ: Prentice Hall, 1995. [2] Secure Hash Standard (SHS). Federal Information Processing Standards Publication National Institute of Standards and Technology, Springfield, Virginia. FIPS Pub, 180. May 1993. [3] Bayya A. Security in Ad-hoc Networks, Computer Science Department. University of Kentucky, Lexington, USA. [4] Yih-Chun H, Perrig A, Johnson DB. Ariadne: A secure on-demand routing protocol for ad-hoc networks. Springer Science + Business Media, Inc., 2005; 11: 21-38.
J. Adv. Res. Netw. Comm. Engi. 2016; 3(1&2) Matharu DS et al.
Yih-Chun H, Perrig A, Johnson DB. Sead: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Elsevier 2003; 1: 175-92. [6] Tang D, Chang C, Tanaka K et al. Resource Discovery in Ad-Hoc networks. Computer System Laboratory, Stanford University, California, 1998. [7] Inkinen K. New Secure Routing in Ad Hoc Networks: Study and Evaluation of Proposed Schemes. HUT T-110.551 Seminar on Internetworking. Sjokulla, 2004. [8] Yang H, Luo H, Ye F et al. Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 2004; 11(1): 38-47.
Zapata MG. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing. Mobile Computing and Communications Review 2001; 6(3). [10] Zapata MG, Asokan N. Securing Ad Hoc Routing Protocol. WiSe, Atlanta, Georgia, USA, 2002. [11] Po-Wah Y, Mitchell CJ. Security Vulnerabilities in AdHoc Networks. Royal Holloway, University of London, Surrey, UK. [12] Young Ho P, Hwangjun S, Kyung Keun L et al. Secure Route Discovery Protocol for Ad Hoc Networks. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2007; E90-A(2)
Refbacks
- There are currently no refbacks.