- C E Perkins & E M Royer Ad hoc On-Demand
Distance Vector Routing, 2nd IEEE Workshop on
Mobile Computing Systems and Applications, pp 90-
100, New Orleans, L.A, February 1999
- Z Hass & R Pearlmann, Zone routing Protocol, IETF
Internet Draft, 1999.
- S Gupte & M Singhal, Secure Routing in Mobile
Wireless Ad hoc Networks, Ad Hoc Networks, vol
1, pp 151-174, July 2003.
- A Yang, H Luo, S Lu & L Zhang, Security in Mobile
Ad hoc Networks: Challenges and Solutions, IEEE
Wireless Communications, vol 11, no 1, pp 38-47,
February 2004.
- H Deng, W Li & D P Agrawal, Routing Security in
Wireless Ad hoc Networks, IEEE Communications
Magazine, pp 70-75, October 2002.
- Yih-Chun Hu & A Perrig, A Survey of Secure
Wireless Ad hoc Routing, IETE Security and
Privacy, vol 2, no 3, pp 28-39, May-June 2004.
- S Yi, P Naldurg & R Kravets, Security-Aware
Routing Protocol for Wireless Ad Hoc Networks,
Proceedings of the 2nd ACM International
Symposium on Mobile Ad Hoc Networking & Computing, pp 299-302, Long Beach, CA, USA,
October 2001.
- P Papadimitratos & Z J Haas, Secure Routing for
Mobile Ad hoc Networks, Proceedings of SCS
Communication Networks and Distributed Systems
Modeling and Simulation Conference, San Antonio,
USA, 2002.
- K Sanzgiri, B Dahill, B N Levine, C Shields & E M
Belding-Royer, A Secure Routing Protocol for Ad
hoc Networks, Proc. of 10th JEEE International
Conference on Network Protocols (ICNP’02), pp
78-87, 2002.
- S Marti, T J Giuli, K Lai & M Baker, Mitigating
Routing Misbehavior in Mobile Ad hoc Networks, 6th ACM Annual International Conference on
Mobile Computing and Network (MOBICOM 2000),
pp 255-265, Boston, USA, August 2000.
- P Papadimitratos & Z J Haas, Secure Message
Transmission in Mobile Ad hoc Networks, Ad Hoc
Networks, vol 1, pp 193-209, 2003.
|
|
-
L Lamport, Password Authentication with Insecure
Communication, Communications of the ACM, vol
24 (11), pp 770-772, November 1981.
-
A A Pirzada & C McDonald, Establishing Trust in
Pure Ad hoc Networks, 27th Conference on
Australasian Computer Science, vol 26, pp 47-54,
Dunedin, New Zealand, 2004.
-
Y Zheng, P Zhang & T Virtanen, Trust Evaluation
Based Security Solution in Ad hoc Networks, 7th
Nordic Workshop on Secure IT Systems, Gjøvik,
Norway, October 2003.
-
L Zhou & Z J Hass, Securing Ad Hoc Networks, IEEE Network, vol 13, pp 24-30, Nov-Dec 1999.
-
A Mishra, K M Nadkarni & A Patcha, Intrusion
Detection in Wireless Ad hoc Networks, IEEE
Wireless Communications, pp 48-60, Feb 2004.
-
Y Zhang & W Lee, Intrusion Detection in Wireless
Ad hoc Networks, 6th ACM Annual International
Conference on Mobile Computing and Networking
(MOBICOM2000), pp 275-283, Boston, USA,
August 2000.
-
W A Jansen, Intrusion Detection with Mobile
Agents, Computer Communications, vol 25, pp
1392-1401, 2002.
-
Y Huang & W Lee, A Cooperative Intrusion
Detection System for Ad hoc Networks, 1st ACM
Workshop on Security of Ad Hoc and Sensor
Networks, pp 135-147, Fairfax, Virginia, USA, 2003.
-
W Wang, Y Lu & B Bhargava, On Security Study
of Two Distance Vector Routing Protocols for
Mobile Ad Hoc Networks, First IEEE International
conference on Pervasive Computing and
Communications (PerCom’03), 2003.
-
S P Alampalayam & A Kumar, Security Models for
Routing Attacks in Mobile Ad hoc Networks, IEEE
58th Vehicular Technology Conference, vol 3, pp
2122-2126, Oct 2003.
-
S Buchegger & J-Y Le Boudec, Nodes Bearing
Grudges: Towards Security, Fairness and Robustness
in Mobile Ad hoc Networks, 10th IEEE Euromicro
Workshop on Parallel, Distributed and Networkbased
Processing, pp 403-410, January 2002.
|