1 |
Aarti and S. S. Tyagi, "Study of MANET : Characteristics, Challenges, Application and Security Attacks," International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 5, 2013, pp. 252-257.
|
2 |
A. K. Gupta, H. Sadawati and A. K. Verma, "Review of various routing protocols for MANETs," International Journal of Information and Electronics Engineering, Vol. 1, No. 3, 2011, pp. 251-259.
|
3 |
Shaveta, P. Singh and R. Preet, "Reviewing MANETs & Configuration of Certificate Authority(CA) for node Authentication," IJCSIT, Vol. 4, No. 6, 2013, pp.974-978.
|
4 |
S. Mishra and N. Mod, "GSM Mobile Authentication Based on User SIM," IJCST, Vol. 2, Issue 6, 2014, pp. 121-125.
|
5 |
P. Papadimitratos and Z. J. Haas, "Secure Routing: Secure Data Transmission in Mobile Ad Hoc Networks," Proc. ACM Wksp. Wireless Security 2003, Sept. 2003, pp. 41-50.
|
6 |
Jin-Hee Cho, Ananthram Swami and Ing-Ray Chen, "A Survey on Trust Management for Mobile Ad Hoc Networks for Mobile Ad-Hoc Networks," IEEE Communication Surveys & Tutorials, Vol. 13, No. 4, 2011, pp. 562-583.
DOI
|
7 |
S. Dabideen, B. R. Smith and J. J. Garcia-Luna-Aceves, "An End-to-End Solution for Secure and Survivable Routing in MANETs," 7th International Workshop on Design of Reliable Communication Networks, Washington DC, 25-28 October 2009, pp. 183-190.
|
8 |
왕종수, 서두옥, "Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜," 디지털산업정보학회지, 제10권, 제4호, 2014, pp. 11-18.
|
9 |
Roopaligarg and Himika Sharma, "Comparison between Sybil Attack Detection Technique: Lightweight and Robust," International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 3, issue 2, 2014, pp. 7142-7147.
|
10 |
양환석, "Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구," 디지털산업정보학회지, 제10권, 제3호, 2014, pp. 161-169.
|