1 |
K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, 2007. Article (CrossRef Link)
DOI
|
2 |
S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” in Proc. of MobiCom, pp. 255–265, 2000. Article (CrossRef Link)
|
3 |
A. A. Pirzada, A. Datta, and C. McDonald, “Incorporating trust and reputation in the DSR protocol for dependable routing,” Computer Communications, vol. 29, no.15, pp. 2806–2821, 2006. Article (CrossRef Link)
DOI
|
4 |
M. Shakshuki, N. Kang, and T. R. Sheltami, “EAACK—A Secure Intrusion-Detection System for MANETs,” IEEE Trans. Ind. Electron., vol. 60, no. 3, pp. 1089–1098, 2013. Article (CrossRef Link)
DOI
|
5 |
K. Xu, M. Gerla, and S. Bae, “How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks,” in Proc. 2002 IEEE GLOBECOM, pp. 72–76, Nov. 2002. Article (CrossRef Link)
|
6 |
H. M. Sun, C. H. Chen, and Y. F. Ku, “A novel acknowledgment-based approach against collude attacks in MANET,” Expert Systems with Applications, vol. 39, no. 9, pp. 7968–7975, 2012. Article (CrossRef Link)
DOI
|
7 |
E. Winjum, P. Spilling, and O. Kure, “Trust Metric Routing to Regulate Routing Cooperation in Mobile Wireless Ad Hoc Networks,” in Proc. of Wireless Conference 2005-European wireless, pp. 1–8, 2005. Article (CrossRef Link)
|
8 |
H.Xia, Z. Jia, X. Li, L. Ju, and E. H.-M. Sha, “Trust prediction and trust-based source routing in mobile ad hoc networks,” Ad Hoc Networks, vol. 11, no. 7, pp. 2096–2114, 2013. Article (CrossRef Link)
DOI
|
9 |
A.C.-C. Yao and Y. Zhao, “Online/Offline Signatures for Low-Power Devices,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 2, pp. 283–294, 2013. Article (CrossRef Link)
DOI
|
10 |
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, “ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks,” ACM Trans. Inf. Syst. Secur., vol. 10, no. 4,pp. 1–35 , Jan. 2008. Article (CrossRef Link)
DOI
|
11 |
K. Balakrishnan, J. Deng, and P.K. Varshney, “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,” in Proc. of IEEE WCNC, pp. 2137-2142, 2005. Article (CrossRef Link)
|
12 |
R.V. Boppana and X. Su, “On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Comput., vol. 10, no. 8, pp. 1162–1174, 2011. Article (CrossRef Link)
DOI
|
13 |
V. Heydari, and S.M. Yoo, “Mean Number of Hops in Flooding-Based Ad Hoc Networks,” Submitted to Inf. Process. Lett.,2015
|
14 |
S. Buchegger and J. Y. Boudec, “Performance analysis of the CONFIDANT protocol: cooperation of nodes: Fairness in dynamic ad-hoc networks,” in Proc. of MobiHOC, pp. 226–236, 2002. Article (CrossRef Link)
|
15 |
C. Chang, J. Lin, and F. Lai, “Trust-group-based authentication services for mobile ad hoc networks,” in Proc. of ISWPC ’06, pp. 37–40, 2006. Article (CrossRef Link)
|
16 |
T. Chen, O. Mehani, and R. Boreli, “Trusted routing for VANET,” in Proc. of ITST ’09, pp. 647–652, 2009. Article (CrossRef Link)
|
17 |
R. Jain, “The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling,” Wiley- Interscience, New York, 1991. Article (CrossRef Link)
|
18 |
T. Krovetz, “RFC 4418: UMAC: Message Authentication Code using Universal Hashing,” 2006. Article (CrossRef Link)
|