|
[1] C. E. Perkins, “Ad Hoc Networks”, Addison-Wesley, March 2001. [2] U. Varshney, “Recent Advances in Wired Networking”, Computer, Vol. 33, Issue: 4, Page(s): 107-109, April 2000. [3] J. Kong, Luo, K. Xu, D.L. Gu, M. Gerla, and S. Lu., “Adaptive Security for Multi-level Ad-Hoc Networks,” WCMC, vol.2, Page(s):533-547, 2002. [4] E. M. Royer; C. K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks”, Personal Communications, IEEE see also IEEE Wireless Communications, Volume 6, Issue 2, Page(s):46 – 55, April 1999. [5] L. Abusalah, A.Khokhar, M. Guizani, “A Survey of Secure Mobile Ad Hoc Routing Protocols”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS,, VOL. 10, NO. 4, Fourth Quarter 2008. [6] C. E. Perkins, E. M. Royer, “Ad-hoc On-Demand Distance Vector Routing,” Proc. 2nd IEEE Wksp. Mobile Comp. Sys. And Apps, Page(s):90-100, Feb. 1999. [7] S. Adibi, G. B. Agnew, “Multilayer flavoured dynamic source routing in mobile ad-hoc networks”, Communications, IET, Volume 2, Issue 5, Page(s):690 – 707, May 2008. [8] C. W. Jin; S. Tekinay, “An Efficient Table Driven Routing Algorithm for Wireless Ad Hoc Networks”, Vehicular Technology Conference, Volume 4, Page(s):2604 – 2608, Oct. 2001. [9] D. Maltz et al., “The Effects of On-demand Behavior in Routing Protocols for Multihop Wireless Ad Hoc Networks,” IEEE JSAC, vol. 17, no. 8, Aug. 1999. [10] R. S. Chang, W. Y. Chen, Y. F. Wen, “Hybrid Wireless Network Protocols”, Vehicular Technology, IEEE Transactions on, Volume 52, Issue 4, Page(s):1099 – 1109, July 2003. [11] Z. Lidong, Z.J. Haas, “Securing ad hoc networks”, Network, IEEE, Volume 13,Issue 6, Page(s):24 - 30 , Nov. 1999. [12] Y.C. Hu, A. Perrig, D. B. Johnson, “Ariadne : a secure on-demand routing protocol for ad hoc networks,” MobiCom 2002, Sep 2002. [13] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks”, MobiCom 2000, Boston, MA, Aug 2000. [14] W. Lou, Y. Fang, “A survey of wireless security in mobile ad hoc networks: challenges and available solutions”, book chapter in Ad Hoc Wireless Networking, Kluwer, May 2003. [15] R. D. Joshi, P. P. Rege, “Distributed energy efficient routing in ad hoc networks”, Wireless Communication and Sensor Networks, 2008. WCSN 2008. Fourth International Conference, Page(s):16 – 21, Dec. 2008. [16] G. V. S. Raju, G. Hernandez, Q. Zou, ” Quality of service routing in ad hoc networks”, Wireless Communications and Networking Conference, 2000. WCNC. 2000 IEEE, Volume 1, Page(s):263 – 265, Sept. 2000. [17] E. M. Royer, “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”, IEEE Personal Communications, Page(s):44 – 55, April 1999. [18] J. Raju, J. J. Grace-Luna-Aceves, “A Comparison of On-Demand and Table Driven Routing for Ad-Hoc Wireless Networks”, Communications, 2000. ICC 2000. IEEE, Volume 3, Page(s):1702 - 1706, June 2000. [19] X. Zou, B. Ramamurthy, S. Magliveras, “Routing Techniques in Wireless Ad Hoc Networks – Classification and Comparision”, Nebraska Research Initiative(NRI)-Mobile Communication Research Project, January 2002. [20] G. R. Hiertz, , S. Max, Z. Yunpeng, T. Junge, D Denteneer , “IEEE 802.11s MAC Fundamentals”, Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE , Page(s):1 – 8, Oct. 2007. [21] J. P. O Grady, A. McDonald, “State of the Art: Ad Hoc Networking”, Adaptive Wireless Systems Group Cork Institute of Technology, State of Art Surveys: Release 2, May 2003. [22] C. E. Perkins and P. Bhageat, “Highly Dynamic Destination- Sequenced Distance-Vector Routing for Mobile Computers”, Computer Communication, Oct. 1994. [23] J. Moy, “OSPF version 2,” RFC 2328, Apr 1998. [24] P.Jacquet, P. Muhlethaler, A. Qayyum, “Optimized Link State Routing Protocol,” Internet Draft, draft-ietg-manet-olsr-00.txt, November 1998. [25] A. A. Pirzada, C. McDonald, “Trusted route discovery with TORA protocol”, Communication Networks and Services Research, Page(s):121 – 130, May 2004. [26] Z. J. Haas, M. R. Pearlman, “The Performance of Query Control Schemes for the Zone Routing Protocol”, ACM/IEEE Trans. Networking, Page(s):427-438, 2001. [27] D. B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts”, Proc. IEEE Wksp. Mobile Computing Systems and Applications, Dec. 1994. [28] L. Abusalah, A. Khokhar, M. Guizani, “A Survey of Secure Mobile Ad Hoc Routing Protocols”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, Fourth Quarter 2008. [29] C. C. Lo, C. Y. Kuo, Y. H. Huang, K. C. Lin, Y. P. Chu, “A Study on Hidden Receiver Problem in Mobile Ad Hoc Networks”, Wireless and Mobile Communications, 2008. ICWMC '08. The Fourth International Conference, Page(s):49 – 54, Aug. 2008. [30] P. Karn, “MACA—A new channel access method for packet radio”, ARRL/CRRL Amateur Radio 9th Computer Networking, Page(s): 134–140, 1990.
|