344
IETE TECHNICAL REVIEW, Vol 23, No 6, 2006
 

 

  1. C E Perkins & E M Royer Ad hoc On-Demand Distance Vector Routing, 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp 90- 100, New Orleans, L.A, February 1999

  2. Z Hass & R Pearlmann, Zone routing Protocol, IETF Internet Draft, 1999.

  3. S Gupte & M Singhal, Secure Routing in Mobile Wireless Ad hoc Networks, Ad Hoc Networks, vol 1, pp 151-174, July 2003.

  4. A Yang, H Luo, S Lu & L Zhang, Security in Mobile Ad hoc Networks: Challenges and Solutions, IEEE Wireless Communications, vol 11, no 1, pp 38-47, February 2004.

  5. H Deng, W Li & D P Agrawal, Routing Security in Wireless Ad hoc Networks, IEEE Communications Magazine, pp 70-75, October 2002.

  6. Yih-Chun Hu & A Perrig, A Survey of Secure Wireless Ad hoc Routing, IETE Security and Privacy, vol 2, no 3, pp 28-39, May-June 2004.

  7. S Yi, P Naldurg & R Kravets, Security-Aware Routing Protocol for Wireless Ad Hoc Networks, Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp 299-302, Long Beach, CA, USA, October 2001.

  8. P Papadimitratos & Z J Haas, Secure Routing for Mobile Ad hoc Networks, Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio,
    USA, 2002.

  9. K Sanzgiri, B Dahill, B N Levine, C Shields & E M Belding-Royer, A Secure Routing Protocol for Ad hoc Networks, Proc. of 10th JEEE International Conference on Network Protocols (ICNP’02), pp 78-87, 2002.

  10. S Marti, T J Giuli, K Lai & M Baker, Mitigating Routing Misbehavior in Mobile Ad hoc Networks, 6th ACM Annual International Conference on Mobile Computing and Network (MOBICOM 2000), pp 255-265, Boston, USA, August 2000.

  11. P Papadimitratos & Z J Haas, Secure Message Transmission in Mobile Ad hoc Networks, Ad Hoc Networks, vol 1, pp 193-209, 2003.
 
  1. L Lamport, Password Authentication with Insecure Communication, Communications of the ACM, vol 24 (11), pp 770-772, November 1981.

  2. A A Pirzada & C McDonald, Establishing Trust in Pure Ad hoc Networks, 27th Conference on Australasian Computer Science, vol 26, pp 47-54, Dunedin, New Zealand, 2004.

  3. Y Zheng, P Zhang & T Virtanen, Trust Evaluation Based Security Solution in Ad hoc Networks, 7th Nordic Workshop on Secure IT Systems, Gjøvik, Norway, October 2003.

  4. L Zhou & Z J Hass, Securing Ad Hoc Networks, IEEE Network, vol 13, pp 24-30, Nov-Dec 1999.

  5. A Mishra, K M Nadkarni & A Patcha, Intrusion Detection in Wireless Ad hoc Networks, IEEE Wireless Communications, pp 48-60, Feb 2004.

  6. Y Zhang & W Lee, Intrusion Detection in Wireless Ad hoc Networks, 6th ACM Annual International Conference on Mobile Computing and Networking (MOBICOM2000), pp 275-283, Boston, USA, August 2000.

  7. W A Jansen, Intrusion Detection with Mobile Agents, Computer Communications, vol 25, pp 1392-1401, 2002.

  8. Y Huang & W Lee, A Cooperative Intrusion Detection System for Ad hoc Networks, 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp 135-147, Fairfax, Virginia, USA, 2003.

  9. W Wang, Y Lu & B Bhargava, On Security Study of Two Distance Vector Routing Protocols for Mobile Ad Hoc Networks, First IEEE International conference on Pervasive Computing and Communications (PerCom’03), 2003.

  10. S P Alampalayam & A Kumar, Security Models for Routing Attacks in Mobile Ad hoc Networks, IEEE 58th Vehicular Technology Conference, vol 3, pp 2122-2126, Oct 2003.

  11. S Buchegger & J-Y Le Boudec, Nodes Bearing Grudges: Towards Security, Fairness and Robustness in Mobile Ad hoc Networks, 10th IEEE Euromicro Workshop on Parallel, Distributed and Networkbased Processing, pp 403-410, January 2002.