[1]
|
Conti, M. (2003) Body, Personal, and Local Ad Hoc Wireless Networks. In: Ilyas, M., Ed., The Handbook of Ad Hoc Wireless Networks, CRC Press, Inc., Boca Raton, 3-24.
|
[2]
|
Weiser, M. (1991) The Computer for the Twenty-First Century. Scientific American, 265, 94-104.
|
[3]
|
Perkins, C.E. (2001) Ad Hoc Networking. Addison-Wesley, Reading.
|
[4]
|
Corson, M.S., Macker, J.P. and Cirincione, G.H. (1999) Internet-Based Mobile Ad Hoc Networking. IEEE Internet Computing, 3, 63-70. http://dx.doi.org/10.1109/4236.780962
|
[5]
|
Macker, J. (1999) Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC 2501, January1999.
|
[6]
|
Johnson, D.B. and Maltz, D.A. (1996) Dynamic Source Routing in Ad Hoc Wireless Networks. In: Imielinski, T. and Korth, H.F., Eds., Mobile Computing, Springer, New York, 153-181. http://dx.doi.org/10.1007/978-0-585-29603-6_5
|
[7]
|
Perkins, C., Belding-Royer, E. and Das, S. (2003) Ad Hoc On-Demand Distance Vector (AODV) Routing. RFC 3561, July 2003.
|
[8]
|
Gellens, R. (1999) Wireless Device Configuration (OTASP/OTAPA) via ACAP.
|
[9]
|
Perkins, C.E. and Bhagwat, P. (1994) Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. ACM SIGCOMM Computer Communication Review, 24, 234-244. http://dx.doi.org/10.1145/190809.190336
|
[10]
|
Mishra, A. and Nadkarni, K.M. (2003) Security in Wireless Ad Hoc Networks. In: Ilyas, M., Ed., The Handbook of Ad Hoc Wireless Networks, CRC Press, Inc., Boca Raton, 499-549.
|
[11]
|
Yang, H., Luo, H., Ye, F., Lu, S. and Zhang, L. (2004) Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications, 11, 38-47. http://dx.doi.org/10.1109/MWC.2004.1269716
|
[12]
|
Raffo, D., Adjih, C., Clausen, T. and Mühlethaler, P. (2005) Securing OLSR Using Node Locations. Proceedings of the 11th European Wireless Conference 2005—Next Generation Wireless and Mobile Communications and Services (European Wireless), Nicosia, 10-13 April 2005, 1-7.
|
[13]
|
Myers, A.D. and Basagni, S. (2002) Wireless Media Access Control. In: Stojmenovic, I., Ed., Handbook of Wireless Networks and Mobile Computing, John Wiley & Sons, Inc., New York, 119. http://dx.doi.org/10.1002/0471224561.ch6
|
[14]
|
Zhang, Y., Lee, W. and Huang, Y.A. (2003) Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks, 9, 545-556. http://dx.doi.org/10.1023/A:1024600519144
|
[15]
|
Perkins, C.E. (2001) Ad Hoc Networking: An Introduction. Ad Hoc Networking, 40, 20-22.
|
[16]
|
Papadimitratos, P. and Haas, Z.J. (2002) Securing Mobile Ad Hoc Networks. In: Ilyas, M., Ed., The Handbook of Ad Hoc Wireless Networks, CRC Press, Inc., Boca Raton, 665-671. http://dx.doi.org/10.1201/9781420040401.ch31
|
[17]
|
Zhou, L. and Haas, Z.J. (1999) Securing Ad Hoc Networks. IEEE Network, 13, 24-30. http://dx.doi.org/10.1109/65.806983
|
[18]
|
Vinayakray-Jani, P. (2002) Security within Ad Hoc Networks. Proceeding of the PAMPAS Workshop, London, 16-17 September 2002.
|
[19]
|
Biswas, K. and Ali, M.L. (2007) Security Threats in Mobile Ad-Hoc Network. Master’s Thesis, Department of Interaction and System Design School of Engineering, Blekinge, 9-26.
|
[20]
|
Woo, S.C.M. and Singh, S. (2001) Scalable Routing Protocol for Ad Hoc Networks. Wireless Networks, 7, 513-529. http://dx.doi.org/10.1023/A:1016726711167
|
[21]
|
Parker, J. (2006) Discussion Record for the 1st MANET Reading Group Meeting. February.
|
[22]
|
Viennot, L., Jacquet, P. and Clausen, T.H. (2004) Analyzing Control Traffic Overhead versus Mobility and Data Traffic Activity in Mobile Ad-Hoc Network Protocols. Wireless Networks, 10, 447-455. http://dx.doi.org/10.1023/B:WINE.0000028548.44719.fe
|
[23]
|
Amitabh, M. (2008) Security and Quality of Service in Ad Hoc Wireless Networks. Cambridge University Press, Cambridge.
|
[24]
|
Gokhale, V., Ghosh, S. and Gupta, A. (2010) Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey. In: Pathan, A.S.K., Ed., Security of Self-Organizing Networks, MANET, WSN, WMN, VANET, Auerbach Publications, Boston, 195-225. http://dx.doi.org/10.1201/EBK1439819197-12
|
[25]
|
Papadimitratos, P. and Haas, Z.J. (2003) Secure Link State Routing for Mobile Ad Hoc Networks. IEEE Symposium on Applications and the Internet, 27-31 January 2003, 379-383.
|
[26]
|
Ilyas, M., Ed. (2002) The Handbook of Ad Hoc Wireless Networks. CRC Press, Boca Raton.
|
[27]
|
Burg, A. (2003) Ad Hoc Network Specific Attacks. In: Seminar Ad Hoc Networking: Concepts, Applications, and Security, Technische Universitat Munchen, Munich.
|
[28]
|
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C. and Royer, E.M.B. (2002) A Secure Routing Protocol for Ad Hoc Networks. Proceedings of the 10th IEEE International Conference on Network Protocols, Paris, 12-15 November 2002, 78-87. http://dx.doi.org/10.1109/icnp.2002.1181388
|
[29]
|
Li, H., Chen, Z., Qin, X., Li, C. and Tan, H. (2002) Secure Routing in Wired Networks and Wireless Ad Hoc Networks. Technical Report, Department of Computer Science, University of Kentucky, Lexington.
|
[30]
|
William, S. and Stallings, W. (2006) Cryptography and Network Security: For VTU, 4/e. Pearson Education, India.
|
[31]
|
Rajavaram, S., Shah, H., Shanbhag, V., Undercoffer, J. and Joshi, A. (2002) Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks. In: Proceedings of the Student Research Conference, University of Maryland at Baltimore County (UMBC), Baltimore County.
|
[32]
|
Douligeris, C. and Mitrokotsa, A. (2004) DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art. Computer Networks, 44, 643-666. http://dx.doi.org/10.1016/j.comnet.2003.10.003
|
[33]
|
Perkins, C. (1998) Ad Hoc On-Demand Distance Vector (AODV) Routing. IEEE Internet Computing, 2, 58-69.
|
[34]
|
DeCleene, B., Dondeti, L., Griffin, S., Hardjono, T., Kiwior, D., Kurose, J., et al. (2001) Secure Group Communications for Wireless Networks. Proceedings of the IEEE Military Communications Conference, Communications for Network-Centric Operations: Creating the Information Force, 1, 113-117.
|
[35]
|
Sun, B., Wu, K. and Pooch, U.W. (2004) Towards Adaptive Intrusion Detection in Mobile Ad Hoc Networks. Proceedings of the IEEE Global Telecommunications Conference, 6, 3551-3555.
|
[36]
|
Florian, D. (2008) Security Concepts for Robust and Highly Mobile Ad-hoc Networks. April.
|
[37]
|
Lee, S., Han, B. and Shin, M. (2002) Robust Routing in Wireless Ad Hoc Networks. Proceedings of the International Conference on Parallel Processing Workshops, Vancouver, 20-23 August 2002, 73-78.
|
[38]
|
Lazos, L., Liu, S. and Krunz, M. (2009) Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks. Proceedings of the Second ACM Conference on Wireless Network Security, Zurich, 16-19 March 2009, 169-180. http://dx.doi.org/10.1145/1514274.1514299
|
[39]
|
Noubir, G. and Lin, G.L. (2003) Low-Power DoS Attacks in Data Wireless LANs and Countermeasures. ACM SIGMOBILE Mobile Computing and Communications Review, 7, 29-30. http://dx.doi.org/10.1145/961268.961277
|
[40]
|
Xu, W., Trappe, W., Zhang, Y. and Wood, T. (2005) The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM Press, New York, 46-57. http://dx.doi.org/10.1145/1062689.1062697
|
[41]
|
Xu, W., Wood, T., Trappe, W. and Zhang, Y. (2004) Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service. In: Proceedings of the 3rd ACM Workshop on Wireless Security, ACM Press, New York, 80-89. http://dx.doi.org/10.1145/1023646.1023661
|
[42]
|
Wood, A.D., Stankovic, J. and Son, S.H. (2003) JAM: A Jammed-Area Mapping Service for Sensor Networks. Proceedings of the 24th IEEE Real-Time Systems Symposium, Cancun, 3-5 December 2003, 286-297. http://dx.doi.org/10.1109/REAL.2003.1253275
|
[43]
|
Pullen, J. and Wood, D. (1995) Networking Technology and DIS. Proceedings of the IEEE, 83, 1156-1167.
|
[44]
|
Omura, J.K. (1994) Spread Spectrum Communications Handbook. Volume 2, McGraw-Hill, New York.
|
[45]
|
Fadlullah, Z.M., Taleb, T. and Scholler, M. (2010) Combating against Security Attacks against Mobile Ad Hoc Networks (MANETs). In: Pathan, A.S.K., Ed., Security of Self-Organizing Networks, MANET, WSN, WMN, VANET, Auerbach Publications, Boston, 173. http://dx.doi.org/10.1201/ebk1439819197-11
|
[46]
|
Gokhale, V., Ghosh, S.K. and Gupta, A. (2010) Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks. In: Pathan, A.S.K., Ed., Security of Self-Organizing Networks, MANET, WSN, WMN, VANET, Auerbach Publications, Boston, 195-225. http://dx.doi.org/10.1201/EBK1439819197-12
|
[47]
|
Feldman, M., Papadimitriou, C., Chuang, J. and Stoica, I. (2006) Free-Riding and Whitewashing in Peer-to-Peer Systems. IEEE Journal on Selected Areas in Communications, 24, 1010-1019. http://dx.doi.org/10.1109/JSAC.2006.872882
|
[48]
|
Johnson, D.B. (2003) The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks.
|
[49]
|
Zhang, Y. and Lee, W. (2005) Security in Mobile Ad-Hoc Networks. In: Mohapatra, P. and Krishnamurthy, S.V., Eds., Ad Hoc Networks, Springer, New York, 249-268. http://dx.doi.org/10.1007/0-387-22690-7_9
|
[50]
|
Gupta, V., Krishnamurthy, S. and Faloutsos, M. (2002) Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. Proceedings of the IEEE MILCOM, 2, 1118-1123. http://dx.doi.org/10.1109/milcom.2002.1179634
|
[51]
|
Kyasanur, P. and Vaidya, N.H. (2003) Detection and Handling of MAC Layer Misbehavior in Wireless Networks. Proceedings of the 2003 International Conference on Dependable Systems and Networks, San Francisco, 22-25 June 2003, 173-182. http://dx.doi.org/10.1109/dsn.2003.1209928
|
[52]
|
Radosavac, S., Benammar, N. and Baras, J.S. (2004) Cross-Layer Attacks in Wireless Ad Hoc Networks. Proceedings of the 2004 Conference on Information Sciences and Systems, Princeton, 17-19 March 2004, 1266-1271.
|
[53]
|
Zimmermann, H. (1980) OSI Reference Model—The ISO Model of Architecture for Open Systems Interconnection. IEEE Transactions on Communications, 28, 425-432. http://dx.doi.org/10.1109/TCOM.1980.1094702
|
[54]
|
Lou, W. and Fang, Y. (2004) A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions. In: Cheng, X.Z., Huang, X. and Du, D.-Z., Eds., Ad Hoc Wireless Networking, Springer, New York, 319-364. http://dx.doi.org/10.1007/978-1-4613-0223-0_9
|
[55]
|
Hu, Y.C. and Perrig, A. (2004) A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy, 2, 28-39. http://dx.doi.org/10.1109/MSP.2004.1
|
[56]
|
Gideon, N. and Edwin, B.K. (2014) Clustering Effects on Wireless Mobile Ad-Hoc Networks Performances. International Journal of Computer Science & Information Technology (IJCSIT), 6, 1-19.
|
[57]
|
Yi, S., Naldurg, P. and Kravets, R. (2001) Security-Aware Ad Hoc Routing for Wireless Networks. In: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, ACM Press, New York, 299-302. http://dx.doi.org/10.1145/501416.501464
|
[58]
|
Saini, A. and Kumar, H. (2010) Effect of Black Hole Attack on AODV Routing Protocol in MANET. International Journal of Information Technology, Modeling and Computing (IJITMC), 2, 9-17.
|
[59]
|
Li, W. and Joshi, A. (2008) Security Issues in Mobile Ad Hoc Networks—A Survey. Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, 1-23.
|
[60]
|
Jawandhiya, P.M., Ghonge, M.M., Ali, M.S. and Deshpande, J.S. (2010) A Survey of Mobile Ad Hoc Network Attacks. International Journal of Engineering Science and Technology, 2, 4063-4071.
|
[61]
|
Chirala, A.P. (2010) Analysis and Diminution of Security Attacks on Mobile Ad Hoc Network. IJCA Special Issue on “Mobile Ad-Hoc Networks”, MANETs, 105-110.
|
[62]
|
Adjih, C., Raffo, D. and Mühlethaler, P. (2005) Attacks against OLSR: Distributed Key Management for Security. Proceedings of the 2nd OLSR Interop/Workshop, Palaiseau, 28-29 July 2005.
|
[63]
|
Kannhavong, B., Nakayama, H., Kato, N., Nemoto, Y. and Jamalipour, A. (2006) Analysis of the Node Isolation Attack against OLSR-Based Mobile Ad Hoc Networks. Proceedings of the 2006 International Symposium on Computer Networks, Istanbul, 16-18 June 2006, 30-35. http://dx.doi.org/10.1109/iscn.2006.1662504
|
[64]
|
Yi, P., Dai, Z., Zhang, S. and Zhong, Y. (2005) A New Routing Attack in Mobile Ad Hoc Networks. International Journal of Information Technology, 11, 83-94.
|
[65]
|
Kim, K. and Kim, S. (2007) A Sinkhole Detection Method Based on Incremental Learning in Wireless Ad Hoc Networks.
|
[66]
|
Hu, Y.C., Perrig, A. and Johnson, D.B. (2003) Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In: Proceedings of the 2nd ACM Workshop on Wireless Security, ACM Press, New York, 30-40. http://dx.doi.org/10.1145/941311.941317
|
[67]
|
Desilva, S. and Boppana, R.V. (2005) Mitigating Malicious Control Packet Floods in Ad Hoc Networks. Proceedings of the IEEE Wireless Communications and Networking Conference, 4, 2112-2117. http://dx.doi.org/10.1109/wcnc.2005.1424844
|
[68]
|
Mishra, A., Nadkarni, K. and Patcha, A. (2004) Intrusion Detection in Wireless Ad Hoc Networks. IEEE Wireless Communications, 11, 48-60. http://dx.doi.org/10.1109/MWC.2004.1269717
|
[69]
|
Hu, Y.C., Johnson, D.B. and Perrig, A. (2003) SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Ad Hoc Networks, 1, 175-192. http://dx.doi.org/10.1016/S1570-8705(03)00019-2
|
[70]
|
Jou, Y.F., Gong, F., Sargor, C., Wu, X., Wu, S.F., Chang, H.C. and Wang, F.Y. (2000) Design and Implementation of a Scalable Intrusion Detection System for the Protection of Network Infrastructure. Proceedings of the DARPA Information Survivability Conference and Exposition, Hilton Head, 25-27 January 2000, 69-83.
|
[71]
|
Douceur, J.R. (2002) The Sybil Attack. In: Peer-to-Peer Systems, Springer, Berlin Heidelberg, 251-260. http://dx.doi.org/10.1007/3-540-45748-8_24
|
[72]
|
Chan, E.Y., Chan, H.W., Chan, K.M., Chan, V.P., Chanson, S.T., Cheung, M.M., et al. (2004) IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks, Hong Kong, 10-12 May 2004, 581-586. http://dx.doi.org/10.1109/ISPAN.2004.1300541
|
[73]
|
Brutch, P. and Ko, C. (2003) Challenges in Intrusion Detection for Wireless Ad-Hoc Networks. Proceedings of the 2003 Symposium on Applications and the Internet Workshops, Orlando, 27-31 January 2003, 368-373. http://dx.doi.org/10.1109/saintw.2003.1210188
|
[74]
|
Parker, J., Patwardhan, A. and Joshi, A. (2006) Cross-Layer Analysis for Detecting Wireless Misbehavior. Proceedings of the IEEE Consumer Communications and Networking Conference, Las Vegas, 8-10 January 2006, 6-9. http://dx.doi.org/10.1109/ccnc.2006.1592977
|
[75]
|
Zhang, Y., Lee, W. and Huang, Y.A. (2003) Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks, 9, 545-556. http://dx.doi.org/10.1023/A:1024600519144
|
[76]
|
Perrig, A., Canetti, R., Tygar, J.D. and Song, D. (2000) Efficient Authentication and Signing of Multicast Streams over Lossy Channels. Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, 14-17 May 2000, 56-73. http://dx.doi.org/10.1109/SECPRI.2000.848446
|
[77]
|
Marti, S., Giuli, T.J., Lai, K. and Baker, M. (2000) Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, ACM Press, New York, 255-265. http://dx.doi.org/10.1145/345910.345955
|
[78]
|
Hu, Y.C., Perrig, A. and Johnson, D.B. (2003) Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, 3, 1976-1986. http://dx.doi.org/10.1109/infcom.2003.1209219
|
[79]
|
Huang, Y.A. and Lee, W. (2003) A Cooperative Intrusion Detection System for Ad Hoc Networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, ACM Press, New York, 135-147. http://dx.doi.org/10.1145/986858.986877
|
[80]
|
Hu, Y.C., Perrig, A. and Johnson, D.B. (2006) Wormhole Attacks in Wireless Networks. IEEE Journal on Selected Areas in Communications, 24, 370-380. http://dx.doi.org/10.1109/JSAC.2005.861394
|
[81]
|
Awerbuch, B., Holmer, D., Nita-Rotaru, C. and Rubens, H. (2002) An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: Proceedings of the 1st ACM Workshop on Wireless Security, ACM Press, New York, 21-30. http://dx.doi.org/10.1145/570681.570684
|
[82]
|
Dhillon, D., Zhu, J., Richards, J. and Randhawa, T. (2006) Implementation & Evaluation of an IDS to Safeguard OLSR Integrity in MANETs. In: Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, ACM Press, New York, 45-50. http://dx.doi.org/10.1145/1143549.1143560
|
[83]
|
Hu, L. and Evans, D. (2004) Using Directional Antennas to Prevent Wormhole Attacks. Proceedings of the Network and Distributed System Security Symposium, San Diego, 5-6 February 2004, 131-141.
|
[84]
|
Schreiber, F.R. (1973) Sybil. Regnery, Chicago.
|
[85]
|
Qian, L., Song, N. and Li, X. (2005) Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks through Statistical Analysis of Multi-Path. Proceedings of the IEEE Wireless Communications and Networking Conference, 4, 2106-2111.
|
[86]
|
Al-Shurman, M., Yoo, S.M. and Park, S. (2004) Black Hole Attack in Mobile Ad Hoc Networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, ACM Press, New York, 96-97. http://dx.doi.org/10.1145/986537.986560
|
[87]
|
Crepeau, C., Davis, C.R. and Maheswaran, M. (2007) A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes. Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, Niagara Falls, 21-23 May 2007, 19-26.
|