How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols

P Ning, K Sun - Ad Hoc Networks, 2005 - Elsevier
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing
protocols, using the Ad-hoc On-Demand Distance Vector (AODV) protocol as an example. It …

How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols

P Ning, K Sun - Ad Hoc Networks, 2005 - infona.pl
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing
protocols, using the Ad-hoc On-Demand Distance Vector (AODV) protocol as an example. It …

[PDF][PDF] How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols

P Ning, K Sun - cs.wm.edu
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing
protocols, using the Ad-hoc On-Demand Distance Vector (AODV) protocol as an example. It …

How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols

P Ning, K Sun - IEEE Systems, Man and Cybernetics …, 2003 - ieeexplore.ieee.org
We present a systematic analysis of insider attacks against mobile ad-hoc routing protocols,
using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It identifies a …

[PDF][PDF] How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols q

P Ning, K Sun - Ad Hoc Networks, 2005 - academia.edu
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing
protocols, using the Ad-hoc On-Demand Distance Vector (AODV) protocol as an example. It …

[引用][C] How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols

N Peng - Proceedings of the 4th Annual IEEE Information …, 2003 - cir.nii.ac.jp
How to Misuse AODV : A Case Study of Insider Attacks against Mobile Ad-hoc Routing
Protocols | CiNii Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索 …

[PDF][PDF] How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols

P Ning, K Sun - 2003 - Citeseer
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing
protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It …

[PDF][PDF] How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols

P Ning, K Sun - csis.gmu.edu
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing
protocols, using the Ad-hoc On-Demand Distance Vector (AODV) protocol as an example. It …

[PDF][PDF] How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols

P Ning, K Sun - 2003 - scholar.archive.org
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing
protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It …

How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols

P Ning, K Sun - Ad Hoc Networks, 2005 - dl.acm.org
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing
protocols, using the Ad-hoc On-Demand Distance Vector (AODV) protocol as an example. It …