2010 Second International Conference on Computer and Network Technology 2010
DOI: 10.1109/iccnt.2010.29
|View full text |Cite
|
Sign up to set email alerts
|

Securing On-Demand Source Routing in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Many secure routing protocols have been proposed in the literature [27][28][29][30][31][32]. In this section, Ariadne protocol [27], which is a secure, on-demand routing protocol for multihop wireless networks was chosen to illustrate how to use LBSA to specify and analyze secure protocols.…”
Section: Case Study: Ariadne Protocolmentioning
confidence: 99%
“…Many secure routing protocols have been proposed in the literature [27][28][29][30][31][32]. In this section, Ariadne protocol [27], which is a secure, on-demand routing protocol for multihop wireless networks was chosen to illustrate how to use LBSA to specify and analyze secure protocols.…”
Section: Case Study: Ariadne Protocolmentioning
confidence: 99%