Randomized Multipath Routing for Overwhelming Attacks in Wireless Sensor Networks
Abstract
Keywords
Full Text:
PDFReferences
A. Shamir, “How to Share A Secret,” Commun. ACM, vol. 22, no. 11, 1979, pp. 612–13.
Z. Ye, V. Krishnamurthy, and S.K. Tripathi, “A Framework for Reliable Routing in Mobile Ad Hoc Networks,” Proc. IEEE INFOCOM, vol. 1, pp. 270-280, Mar. 2003.
B. Vaidya, J.Y. Pyun, J.A. Park, and S.J. Han, “Secure Multipath Routing Scheme for Mobile Ad Hoc Network,” Proc. IEEE Int’l Symp. Dependable, Autonomic and Secure Computing, pp. 163-171, 2007.
T. Claveirole, M.D. de Amorim, M. Abdalla, and Y. Viniotis, “Securing Wireless Sensor Networks Against Aggregator Compromises,” IEEE Comm. Magazine, vol. 46, no. 4, pp. 134-141, Apr.2008.
P.C. Lee, V. Misra, and D. Rubenstein, “Distributed Algorithms for Secure Multipath Routing,” Proc. IEEE INFOCOM, pp. 1952-1963, Mar. 2005.
P.C. Lee, V.Misra, and D. Rubenstein, “Distributed Algorithms for Secure Multipath Routing in Attack-Resistant Networks,” IEEE/ACM Trans. Networking, vol. 15, no. 6, pp. 1490-1501, Dec. 2007.
M.K. Marina and S.R. Das, “On-Demand Multipath Distance Vector Routing in Ad Hoc Networks,” Proc. IEEE Int’l Conf.Network Protocols (ICNP), pp. 14-23, Nov. 2001.
Ganesan, D.; Govindan, R.; Shenker, S.; Estrin, D. Highly-resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks. ACM Mobile Computing and Communications Review, (MC2R) 2001, pp. 11-25.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.