1 |
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A secure routing protocol for ad hoc networks," in Proc. IEEE Int. Conf. Network Protocols, pp. 78-87, CA, USA, Nov. 2002.
|
2 |
D. Benetti, M. Merro, and L. Vigano', "Model checking ad hoc network routing protocols: ARAN vs. Endaira," in Proc. IEEE Int. Conf. Software Engineering and Formal Methods (SEFM), pp. 191-202, Verona, Italy, Sep. 2010.
|
3 |
A. F. A. Abidin, N. S. M. Usop, and N. H. N. Zulkifli, "An analysis on Endaira," Int. J. Comput. Sci. and Eng., vol. 2, no. 3, pp. 437-442, Mar. 2010.
|
4 |
M. G. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proc. WISE, pp. 1-10, NY, USA, Sep. 2002.
|
5 |
R. Poosarla, H. Deng, A. Ojha, and D. P. Agrawal, "A cluster Based Secure Routing Scheme for Wireless Ad Hoc Networks," in Proc. IEEE, Int. Conf. Perform., Comput., and Commun., pp. 171-175, OH, USA, April 2004.
|
6 |
M. H. Guo, H. T. Liaw, D. J. Deng, and H. C. Chao, "Cluster-based secure communication mechanism in wireless ad hoc networks," Institution of Engineering and Technology Information Security, vol. 4, no. 4, pp. 352-360, Dec. 2010.
|
7 |
M. J Kim and Y. I Eom, "Efficient route maintenance scheme for wireless ad-hoc network environments," J. The Korean Institute of communications and Information Sciences(KICS), vol. 30, no. 8A, pp. 639-648, Aug. 2005.
과학기술학회마을
|
8 |
C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers," Newslett. ACM SIGCOMM Comput. Commun. Rev., vol. 24, no. 4, pp. 234-244, Oct. 1994.
|
9 |
C. E. Perkins, "Ad hoc on demand distance vector (AODV) routing," IETF Internet Draft, July 2003.
|
10 |
C. E. Perkins, "Ad hoc on demand distance vector (AODV) routing," in Proc. IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90-100, LA, USA, Feb. 1999.
|
11 |
Z. J. Hass and M. R. Pearlman, "The Zone Routing Protocol(ZRP) for Ad Hoc Networks," draft-Ietf-manet-zone-zrp-02.txt, June 1999.
|
12 |
M. Rezaee and M. Yaghmaee, "Cluster based Routing for Mobile Ad Hoc networks," J. comput. sci., vol. 8, no. 2, pp. 30-36, June 2009.
|
13 |
S. Gupte and M. Singhal, "Secure routing in mobile wireless ad hoc networks," Ad Hoc Networks, vol. 1, no. 1, pp. 151-174, Jan. 2003.
DOI
ScienceOn
|
14 |
Y. C. Hu and A. Perring, "A survey of secure wireless ad hoc routing," IEEE, Security & Privacy, vol. 2, no. 3, pp. 28-39, June 2004.
|
15 |
A. Burak and M. Ufuk, "A formal security analysis of secure AODV using model checking," in Proc. ISCN, pp. 38-44, Istanbul, June 2008.
|
16 |
L. Tamilselvan and V. Sankaranarayanan, "Prevention of Blackhole Attack in MANET," in Proc. IEEE Int. Conf. Wireless Broadband and Ultra Wideband Commun., pp. 21-26, Sydney, NSW, Aug. 2007.
|
17 |
B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour "A survey of routing attacks in mobile ad hoc networks," IEEE Wireless Commun., vol. 14, no. 5, pp. 85-91, Oct. 2007.
DOI
ScienceOn
|
18 |
R. H. Khokhar, M. A. Ngadi, and S. Mandala "A review of current routing attacks in mobile ad hoc networks," Int. J. Comput. Sci. and Secur. (IJCSS), vol. 2, no. 3, pp. 18-29, June 2008.
|
19 |
M. S. Corson and J. Macker, "Mobile ad hoc networking(MANET): routing protocol performance issues and evaluation considerations," RFC 250, Internet Engineering Task Force, Jan. 1999.
|
20 |
M. Abolhasan, T. Wysocki, and E. Dutkiewicz, "A review of routing protocols for mobile ad hoc networks," Ad Hoc Networks, vol. 2, no. 1, pp. 1-22, Jan. 2004.
DOI
ScienceOn
|
21 |
B. Swetha and S. A. Kummar & TVS P. Gupta, "Flaws in Endair-A secure routing protocol for manets," Special Issue of Int. J. Comput. Sci. & Inform. (IJCSI), vol. 2, no. 1, pp. 127-132, Jan. 2012.
|
22 |
Y. C. Hu, A. Perring, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," J. Wireless Networks, vol. 11, no. 1-2, pp. 21-38, Jan. 2005.
DOI
|