Analysis of Reliable Secure Transmission for Unobservable Secure Table Driven Protocol
J. Kong and X. Hong, ―ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks,‖ in Proc. ACM MOBIHOC’ 03, pp. 291–302.
B. Zhu, Z. Wan, F. Bao, R. H. Deng, and M. KankanHalli, ―Anonymous secure routing in mobile ad-hoc networks,‖ in Proc. 2004 IEEE Conference on Local Computer Networks, pp. 102–108.
L. Song, L. Korba, and G. Yee, ―AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks,‖ in Proc. 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 33–42.
A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, ―SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks,‖ in Proc. 2004 IEEE LCN, pp. 618–624.
D. Sy, R. Chen, and L. Bao, ―ODAR: on-demand anonymous routing in ad hoc networks,‖ in 2006 IEEE Conference on Mobile Ad-hoc and Sensor Systems.
Y. Zhang, W. Liu, and W. Lou, ―Anonymous communications in mobile ad hoc networks,‖ in 2005 IEEE INFOCOM.
K. E. Defrawy and G. Tsudik, ―ALARM: anonymous location-aided routing in suspicious MANETs,‖ IEEE Trans. Mobile Comput., vol. 10, no. 9, pp. 1345–1358, 2011.
David Johnson, Ntsibane Ntlatlapa, and Corinna Aichel , ―Simple pragmatic approach to mesh routing using BATMAN‖, 2nd IFIP International Symposium on Wireless Communications and Information Technology in Developing Countries, 2008
Elis Kulla, Makoto Ikeda, Leonard Brolli, Rozeta Miho, ―Impact of Source and Destination Movement on MANET Performance Considering BATMAN and AODV Protocols‖, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
Dr. V. Kavitha, S. Balaji, R. Jeeva,‖ ESAC Based Channel Aware Routing Using Route Handoff‖, International Journal on Computer Science and Engineering (IJCSE).
Dr. V. Kavitha , S. Balaji , R. Jeeva,‖ RMAC-A New Encryption Scheme for Arithmetic Coding to evade CCA Attacks‖, in 2011 IEEE Conference on Advanced Computing.
Zhiguo Wan, Kui Ren, and Ming Gu, ―USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks‖, in IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 5, MAY 2012..
G. Riley, "The Georgia Tech Network Simulator," in ACMSIGCOMM Workshop on Models, Methods and Tools for Reproducible Network Research Karlsruhe, Germany, 2003
T. Clouqueur, V. Phipatanasuphorn, P. Ramanathan and K. k. Saluja,―Sensor Deployment Strategy for Target Detection,‖ First ACM International Workshop on Wireless Sensor Networks and Applications,2002.
W.R. Heinzelman, A. Chandrakasan, and H.Balakrishnan, "Energy- Efficient Communication Protocol for Wireless Sensor Networks," in Proceedings of the 33th Hawaii International Conference on System Sciences. vol. 2, 2000
R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms and Applications. Upper Saddle River, NJ: Prentice-Hall, 1993.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.