References
- B. Xu, S. Hischke, and B. Walke, "The role of ad hoc networking in future wireless communications," in Proceedings of International Conference on Communication Technology Proceedings (ICCT), Beijing, China, 2003, pp. 1353-1358.
- J. Wang, C. Wang, Q. Wu, and Y. Gong, Ad Hoc Mobile Wireless Network. Beijing, China: National Defense Industry Press, 2004.
- J. N. Turner and C. S. Boyer, Ad Hoc Networks: New Research. New York, NY: Nova Science Publishers, 2009.
- X. Zhu, "Mobile ad hoc network security research," M.S. Thesis, Xi'an University of Electronic Science and Technology, Xi'an, China, 2004.
- S. Wang and H. Yang, "Research and analysis of mobile ad hoc network routing protocol," Computer Age, vol. 3, pp. 14-16, 2006.
- Q. Zhang and M. Luo, "Mobile ad hoc network security strategy," Telecommunication Switching, vol. 1, pp. 29-33, 2006.
- C. E. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing," in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), New Orleans, LA, 1999, pp. 90-100.
- C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," in Proceedings of the Conference on Communications Architectures, Protocols and Applications, London, UK, 1994, pp. 234-244.
- D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks," in Mobile Computing. Boston, MA: Springer, 1996, pp. 153-181.
- D. B. Johnson, D. A. Maltz, and Y. C. Hu, "The dynamic source routing protocol for mobile ad hoc networks (DSR)," 2004 [Online]. Available: https://tools.ietf.org/html/draft-ietf-manet-dsr-10.
- Y. Xiao and X. Shan, "Wireless Ad-hoc network and its research challenges," Telecommunications Science, vol 6, pp. 12-14, 2002.
- Y. C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," Wireless Networks, vol. 11, no. 1-2, pp. 21-38, 2005. https://doi.org/10.1007/s11276-004-4744-y
- K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A secure routing protocol for ad hoc networks," in Proceedings of the 10th IEEE International Conference on Network Protocols, Paris, France, 2002, pp. 78-87.
- B. Dahill, B. N. Levine, E. M. Royer, and C. Shields, "A secure routing protocol for ad hoc networks," University of Massachusetts, Amherst, MA, Technical Report UM-CS-2001-037, 2001.
- H. Jiang, Y. Meng, Y. He, and S. Cheng, "An energy-efficient multicast routing protocol for mobile ad hoc networks," Journal of Circuits and Systems, vol. 7, no. 2, pp. 115-118, 2002.
- C. Ying and M. L. Shi, "QoS Routing in ad-hoc network," Chinese Journal Computers, vol. 24, no. 10, pp. 1026-1033, 2001. https://doi.org/10.3321/j.issn:0254-4164.2001.10.003
- M. G. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proceedings of the 1st ACM Workshop on Wireless Security, Atlanta, GA, 2002, pp. 1-10.
- L. Venkatraman and D. P. Agrawal, "Strategies for enhancing routing security in protocols for mobile ad hoc networks," Journal of Parallel and Distributed Computing, vol. 63, no. 2, pp. 214-227, 2003. https://doi.org/10.1016/S0743-7315(02)00065-5
- M. Akhlaq, M. N. Jafri, M. A. Khan, and B. Aslam, "Integrated mechanism of routing and key exchange in AODV," WSEAS Transactions on Communications, vol. 6, no. 4, pp. 565-572, 2007.
- J. R. Douceur, "The Sybil attack," in Peer-to-Peer Systems. Heidelberg, Germany: Springer, 2002, pp. 251-260.
- A. Shamir, "How to share a secret," Communications of the ACM, vol. 24, no. 11, pp. 612-613, 1979. https://doi.org/10.1145/359168.359176
- L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999. https://doi.org/10.1109/65.806983
- J. R. Quinlan, "Induction of decision trees," Machine Learning, vol. 1, no. 1, pp. 81-106, 1986. https://doi.org/10.1007/BF00116251