1 |
M. Al-Shurman, S.-M. Yoo, and S. Park, Black Hole Attack in Mobile Ad Hoc Networks, the 42nd annual southeast regional conference, ACM Southeast Regional Conference, 2004, pp.96-97.
|
2 |
Y.-C. Hu, A. Perrig, and D. B. Johnson, Wormhole attacks in wireless networks, IEEE Journal on Selected Areas in Communications, Vol.24, No.2, 2006, pp.370-380.
DOI
ScienceOn
|
3 |
P. Yi, Z. Dai, Y. Zhong, and S. Zhang, Resisting Flooding Attacks in Ad Hoc Networks, International Conference on Information Technology: Coding and Computing (ITCC 2005), Vol.2, 2005, pp.657-662.
|
4 |
C. E. Perkins and E. M. Royer, Ad hoc On-Demand Distance Vector Routing, the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA ‘99), 1999, pp.90-100.
|
5 |
A. Khan, T. Suzuki, M. Kobayashi, W. Takita, and K. Yamazaki, Packet Size Based Routing for Stable Data Delivery in Mobile Ad-Hoc Networks, IEICE Transactions on Communications, Vol.E91-B, No.7, 2008, pp.2244-2254.
DOI
ScienceOn
|
6 |
B. A. Forouzan, Cryptography and Network Security, McGraw-Hill, 2008.
|
7 |
B.-G. Chun and M. Baker, Evaluation of Packet Scheduling Algorithms in Mobile Ad Hoc Networks, ACM Mobile Computing and Communications Review (MC2R), Vol.6, No.3, 2002, pp.36-49.
DOI
|
8 |
R. Kumar, M. Misra, and A. K. Sarje, A Routing Protocol for Delay-Sensitive Applications in Mobile Ad Hoc Networks, International Symposium on Ad Hoc and Ubiquitous Computing (ISAUHC '06), 2006, pp.13-18.
|
9 |
S. Li, Q. Liu, H. Chen, and M. Tan, “A New Method to Resist Flooding Attacks in Ad Hoc Networks, International Conference on Wireless Communications”, Networking and Mobile Computing 2006 (WiCOM 2006), 2006, pp.1-4.
|
10 |
Z. Y. Xia and J. Wang, DIMH: “A novel model to detect and isolate malicious hosts for mobile ad hoc network”, Elsevier Computer Standards & Interfaces, Vol.28, 2006, pp.660-669.
DOI
ScienceOn
|
11 |
The VINT Project, The network simulator- ns-2, available at http://www.isi.edu/nsnam/ns/.
|
12 |
D. B. Johnson, D. A. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, Ad Hoc Networking, Chapter 5, Addison-Wesley, 2001, pp.139-172.
|
13 |
Y.-C. Hu and A. Perrig, A Survey of Secure Wireless Ad Hoc Routing, IEEE Security & Privacy, Vol.2, No.3, 2004, pp.28-39.
|
14 |
J. Li, D. Cordes, and J. Zhang, Power-Aware Routing Protocols in Ad Hoc wireless Networks, IEEE Wireless Communications, Vol.12, No.6, 2005, pp.69-81.
DOI
ScienceOn
|