[1]
|
S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, USA, pp. 255–265, 6-11 August, 2000.
|
[2]
|
H. Yang, J. Shu, X. Meng and S. Lu, “SCAN: Self-organized network-layer security in Mobile ad hoc networks,” IEEE Journals on Selected Areas in Communications, Vol. 24, No. 2, February 2006.
|
[3]
|
3. Scalable Networks Technologies: QualNet simulator 4.5, http://www.scalable-networks.com/
|
[4]
|
IEEE 802.11g. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, August, 1999.
|
[5]
|
M. A. Azer, S. M. El-Kassas, and M. S. El-Soudani, “Certification and revocation schemes in ad hoc networks survey and challenges,” Proceeding of IEEE International Conference on Systems and Networks Communications, 2007.
|
[6]
|
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for MANET,” Proceeding of International Conference on Network Protocols, pp. 251–260, 2001.
|
[7]
|
N. Nasser and Y. Chen, “Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks,” Proceeding of International Conference on Communications, pp. 1154–1159, 2007.
|