1 |
M. Jung, C. Reinisch, and K. Wolfgang, "Integrating building automation systems and ipv6 in the internet of things," Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conf. IEEE, p. 683-688, Jun. 2012.
|
2 |
K. Balakrishnan, J. Deng, and P. K. Varshney, "Twoack: preventing selfishness in mobile ad hoc networks," Wireless communications and networking Conf. IEEE, Vol. 4, pp. 2137-2142, Mar. 2005.
|
3 |
K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in manets," IEEE Trans. on Mobile Computing, Vol. 6, no. 5, pp. 536-550, May. 2007.
DOI
|
4 |
H. Miranda and L. Rodrigues, "Friends and foes: Preventing selfishness in open mobile ad hoc networks," in Proc. of Distributed Computing Systems Workshop IEEE, pp. 440-445, May. 2003.
|
5 |
C. Basile, Z. Kalbarczyk, and R. Iyer, "Inner-circle consistency for wireless ad hoc networks," IEEE Trans. on Mobile Computing, Vol. 6, no.1, pp. 39-55, Jan. 2007.
DOI
|
6 |
A. Nadeem and M. Howarth, "Adaptive intrusion detection & prevention of denial of service attacks in manets," in Proc. of the Wireless Communications and Mobile Computing ACM, pp. 926-930, Jun. 2009.
|
7 |
A. Nadeem and M. Howarth, "An intrusion detection & adaptive response mechanism for manets," Ad Hoc Networks, Vol. 13, pp. 368-380, Feb. 2014.
DOI
|
8 |
L. Sanchez-Casado, G. Macia-Fernandez, P. Garcia-Teodoro, and R. Magan-Carrion, "A model of data forwarding in manets for lightweight detection of malicious packet dropping," Computer Networks, Vol. 87, pp. 44-58, Jul. 2015.
DOI
|
9 |
F. Bai and H. Krishnan, "Reliability analysis of dsrc wireless communication for vehicle safety applications," in Proc. of Intelligent Transportation Systems IEEE, pp. 355-362, Sep. 2006.
|
10 |
K. Hong and L. Choi, "Dag-based multipath routing for mobile sensor networks," in Proc. of ICT Convergence, pp. 261-266, Sep. 2011.
|