Efficient and Secure Routing Protocol for Mobile ADHOC Networks
Abstract
Keywords
Full Text:
PDFReferences
Farooq Anjum and Dhanant Subhadrabandhu and Saswati Sarkar “Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols” Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th, Oct. 2003.
Anand Patwardhan, Jim Parker and Anupam Joshi “Secure Routing and Intrusion Detection in Ad Hoc Networks”, Research was supported by NSF award 9875433.
Katrin Hoeper and Guang Gong, ”Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation.
Panagiotis Papadimitratos and Zygmunt J. Haas "Secure Data Communication in Mobile Ad Hoc Networks", IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006.
Chin-Yang Henry Tseng “Distributed Intrusion Detection Models for Mobile Ad Hoc Networks”, M.S. (Santa Clara University) 2002 & B.A. (National Chiao-Tung University, Taiwan) 1998.
S.Madhavi,Dr. Tai Hoon Kim , “AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORKS”, ,International Journal of Security and Its Applications Vol. 2, No.3, July, 2008.
Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”.
Kejun Liu, Jing Deng, Pramod K. Varshney, and Kashyap Balakrishnan, “An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETS”.
Li Zhao and José G. Delgado-Frias, “MARS: Misbehavior Detection in Ad Hoc Networks”, IEEE GLOBECOM 2007 proceedings.
A. Patwardhan, J.Parker, M.Lorga, A.Joshi, T.Karyiannis, and Y.Yesha, “Threshold-based Intrusion Detection in AdHoc Networks and Secure AODV”, Paper Reprinted to Adhoc networks 27 February 2007.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.