Citation: | GENG Kui, LI Fenghua, CAO Jin, et al., “A Trustworthy Path Discovery Mechanism in Ubiquitous Networks,” Chinese Journal of Electronics, vol. 25, no. 2, pp. 312-319, 2016, doi: 10.1049/cje.2016.03.018 |
D. Johnson, Y. Hu and D. Maltz, "The dynamic source routing protocol (DSR) for mobile ad hoc networks for ipv4", RFC 4728, IETF: The Internet Engineering Taskforce, 2007.
|
J.S. Choi, "A hybrid topology discovery protocol for mobile backhaul", Proc. of IEEE CNS 2013, San Diego, CA, USA, pp. 15:1-15:4, 2013.
|
S. Vasudevan, M. Adler, D. Goeckel, et al. "Efficient algorithms for neighbor discovery in wireless networks", IEEE/ACM Trans. Netw., Vol.21, No.1, pp. 69-83, 2013.
|
F. Valentini, M. Pratesi, F. Santucci, et al. "Ipv4 and ipv6 troubleshooting enhancement through reverse path discovery", Proc. of IEEE NOMS 2014, Karkow, Poland, pp.1-4, 2014.
|
I. Avramopoulos, H. Kobayashi, R. Wang, et al. "Highly secure and efficient routing", Proc. of IEEE INFOCOM 2004, Hong Kong, China, pp.197-208, 2004.
|
Y.-C. Hu, A. Perrig and D.B. Johnson, "Ariadne: A secure ondemand routing protocol for ad hoc networks", Wireless Networks, Vol.11, No.1-2, pp.21-38, 2005.
|
K.A. Sivakumar and M. Ramkumar, "An efficient secure route discovery protocol for dsr", Proc. of IEEE GLOBECOM 2007, Washington, D.C., USA, pp.458-463, 2007.
|
C. Chandra and V. Singh, "Advance dynamic source routing (ADSR) for multi hop ad hoc network and performance evaluation of proactive and reactive protocols", Proc. of ACM ICONIAAC 2014, Amritapuri, India, pp.24:1-24:6, 2014.
|
K. Liu, J. Deng, P. K. Varshney, et al. "An acknowledgmentbased approach for the detection of routing misbehavior in manets", IEEE Transactions on Mobile Computing, Vol.6, No.5, pp.536-550, 2007.
|
M. Burmester and B. de Medeiros, "On the security of route discovery in manets", IEEE Transactions on Mobile Computing, Vol.8, No.9, pp.1180-1188, 2009.
|
J. Kim and G. Tsudik, "Srdp: Secure route discovery for dynamic source routing in manets", Ad Hoc Networks, Vol.7, No.6, pp.1097-1109, 2009.
|
J. Naous, M. Walfish, A. Nicolosi, et al. "Verifying and enforcing network paths with icing", Proc. of the ACM CoNEXT 2011, Tokyo, Japan, pp.30:1-30:12, 2011.
|
H. Bakhsh, N. Zhang and A. Carpenter, "Tadl: A trust-aware dynamic location-based protocol suite for discovering multiple paths in manets", Proc. of ACM ICDCN 2015, Goa, India, pp.2:1-2:10, 2015.
|
X. Wu, S. Liu, H. Zhu, et al. "Modeling and verifying the ariadne protocol using csp", Proc. of IEEE ECBS 2012, Novi Sad, Serbia, pp.24-32, 2012.
|
M. Poturalski, P. Papadimitratos and J.-P. Hubaux, "Formal analysis of secure neighbor discovery in wireless networks", IEEE Transactions on Dependable and Secure Computing, Vol.10, No.6, pp.355-367, 2013.
|
L. Chen, K. Bian and M. Zheng, "Heterogeneous multi-channel neighbor discovery formobile sensing applications: Theoretical foundationand protocol design", Proc. of ACM MobiHoc 2014, Philadelphia, PA, USA, pp.307-316, 2014.
|