|
[1]A. Mishra, K. Nadkarni, and A. Patcha, “Intrusion Detection in Wire-less Ad Hoc Networks,” IEEE Wireless Communications, Vol. 11, Issue1, pp. 48-60, February 2004. [2]Asad Amir Pirzada, Chris McDonald, “Establishing trust in pure ad-hoc networks,” ACM International Conference Proceeding Series; Vol. 56, Proceedings of the 27th conference on Australasian computer science - Volume 26, pp.47-54, 2004. [3]Asad Amir Pirzada, Chris McDonald, “Kerberos assisted Authentication in Mobile Ad-hoc Networks, “ Proceedings of the 27th conference on Australasian computer science - Volume 26 CRPIT '04 , pp.41-46, January 2004. [4]B. Sun, K.Wu, and U. W. Pooch, “Alert Aggregation in Mobile Ad Hoc Networks,” Proceedings of the 2003 ACM Workshop on Wireless Security (WiSe'03) in conjuction with the 9th Annual International Conference on Mobile Computing and Networking (MobiCom'03), pp. 69-78,2003. [5]Baolin Sun, Hua Chen, and Layuan Li, “An Intrusion Detection System for AODV, “Proceedings of the 10th International Conference of Engineering of Complex Computer Systems, 2005. [6]C. E. Perkins and E. M. Royer, “Ad hoc on-demand distance vector routing,” in Proc. IEEE WMCSA '99, pp. 90-100, Feb. 1999. [7]C. E. Perkins, Royer, and S. Das, “Ad hoc on-demand distance vector (AODV) routing,” Internet Draft, draft-ietf-manet-aodv-13.txt, Feb. 2003. [8]C. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, “A specification-based intrusion detection system for AODV,” in Proc. ACM SASN '03, pp.125-134, 2003.
[9]C.-Y. Tseng, P. Balasubramanyam, and C. Ko, et al, “A specification-based intrusion detection system for AODV,”, In ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’03), VA, October 2003. [10]D. B. Johnson, and D. A. Maltz, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (Internet-Draft),” Mobile Ad-hoc Network (MANET) Working Group, IETF, October 1999. [11]G. Vigna, S. Gwalani, K. Srinivasan, E. M. Belding-Royer, and R. A. Kemmerer, “An intrusion detection tool for AODV-based ad hoc wireless networks, “ IEEE ACSAC '04, pp. 16-27, Dec. 2004. [12]IEEE, “Wireless LAN medium access control (MAC) and Physical layer (PHY) specifications, “ IEEE Standard 802.11, 1999 Edition, 1999. [13]J. Parker, J. Undercoer, J. Pinkston, A. Joshi, “On intrusion detection and response for mobile ad hoc networks,” in Proc. IEEE PCCC '04, pp. 747-752, Jun. 2004. [14]Keun-Ho Lee et al. “Authentication Based on Multilayer Clustering in Ad Hoc Networks,” EURASIP Journal on Wireless Communications and Networking 2005:5, pp.731–742, May.2005. [15]Liang Qin, Thomas Kunz, “Pro-active route maintenance in DSR,”ACM SIGMOBILE Mobile Computing and Communications Review Volume 6 , Issue 3, pp.79-89, July 2002. [16]M. G. Zapata, N. Asokan, “Securing ad-hoc routing protocols,” in Proc. ACM WiSE '02, pp. 1-10, Sep. 2002. [17]Mathias Bohge, Wade Trappe, “An Authentication Framework for Hierarchical Ad Hoc Sensor Networks,” Proceedings of the 2003 ACM Workshop on Wireless Secu-rity (WiSe'03), pp.79-87, Sep. 2003. [18]P. Brutch and C. Ko, “Challenges in Intrusion Detection for Wireless Ad-hoc Networks,” Proceedings of 2003 Symposium on Applications and the Internet Workshop, pp. 368-373, January 2003. [19]P. Ning and K. Sun, “How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols,” in Proc. IEEE Information Assurance Workshop '03, pp. 60-67, Jun. 2003. [20]Rajiv K. Nekkanti, Chung-wei Lee, “Trust based adaptive on demand ad hoc routing protocol,” ACM Southeast Regional Conference archive Proceedings of the 42nd annual Southeast regional conference, pp88-93, 2004. [21]S. Buchegger and J. Le Boudec, “Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks),” Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02), pp. 226-336, June 2002. [22]Tiranuch Anantvalee, Jie Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” Wireless/Mobile Network Security, pp.170-196, 2003. [23]Y. Bai and H. Kobayashi, “Intrusion detection systems: technology and development,” in Proc. IEEE AINA '03, pp. 710-715, Mar. 2003. [24]Y. F. Jou, F. Gong, C. Sargor, X. Wu, S. Wu, H. Chang, and F. Wang,”Design and Implementation of a Scalable Intrusion Detection System for the Protection of Networks Infrastructure,” Proceedings of DARPA Information Survivability Conference and Exposition, Vol. 2, pp. 69-83, January 2000. [25]Y. Zhang, W. Lee, and Y. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks,” ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, September 2003 [26]The network simulator - ns-2, http://www.isi.edu/nsnam/ns/ [27]Wi-Fi Alliance's WPA page, http://www.wi-fi.org/opensection/protected_access.asp [28]台北市網路新都 - http://www.healthcity.net.tw/
|