References
- N. Aboudagga, M. Tamer, M. Eltoweissy, L. DaSilva, and J. J. Quisquater, "Authentication protocols for ad-hoc networks: Taxonomy and researchissues," in Proc. 1st ACM international workshop on Quality of service and security in wireless and mobile networks, Oct. 2005
- A. Weimεrskirch, "Authentication in ad-hoc and sensor networks," Ph.D. thesis, Ruhr-University Bochum, Germany, July 2004
- L. Zhou and Z. Haas, "Securing ad-hoc networks," IEEE Network, vol. 13,pp. 24-30, 1999
- H. Luo amd S. Lu, "Ubiquitous and Tobust authentieation services for adhoc wirelcss networks," Department of Computer Science, UCLA, Tech.Rep. TR-200030, 2000
- J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu, "Adaptive securityfor multi-Ievel ad-hoc networks," J. Wireless Commun. Mobile Comput. ,pp.533-547, 2002
- S. Jarecki, N. Saxena, and J. H. Yi, "An attack on the proactive RSA signatureschemε in the URSA ad hoc network acccss control protocol," inProc. ACM Workshop on Secμrity of Ad Hoc and Sensor Networks" 2004,pp.1-9
- J. P. Hubaux, L. Buttyán, and S. Capkun, "The quest for security in mobílead-hoc networks," in Proc. MobiHoc, 2001, pp‘146-155
- Y. Kím, D. Mazzocchi, and G. Tsudik, "Admission control in peer groups," in Proc. IEEE lnternational Symposium on Network Computing and Applications, 2003
- S. Hahrn, Y. Jung, S. Yi, Y. Song, I. Chong, and K. Lim, "A self-organized architecture in mobile ad-hoc networks," in Proc. ICOIN, 2005, pp. 689-696
- N. Saxena, G. Tsudik, and J. H. Yi, "Efficient node admission for shortlivedmobile ad-hoc networks," in Proc. ICNP, Nov. 2005, pp. 269-278.
- O. Goldreich, S. Micali, and A. Wigderson, "How to prove all NPstatementsin zero-knowledge, and a methodology of cryptographic protocoldesign," in Proc. Crypto, vol. 263, 1986, pp. 171-185
- H. Asaeda, M. Rahman, H. Manshaei, and Y. Fukuzawa, "Implementation of group member authentication protocol in mobile ad-hoc lletworks," inProc. WCNC, Las Vegas, USA Apr. 2006
- A. Wierzbicki, A. Zwierko, and Z. Kotulski, "A new authentication protocol for revocable anonymity ín ad-hoc networks," in Proc. CNIS, 2005
- P. Caballero-Gil and C. Hernandez-Goya, "Zero-knowledge hierarchical authentication in MANETs," IEICE Trans. lnf System Lett., E-89-D,pp.1288-1289, 2006
- P. Caballero-Gil and C. Caballεro-Gil, "A global authelltication scheme for mobile ad-hoc networks," in Proc. IWSEC, 2007, pp. 105-120
- P. Caballero-Gil, C. Caballero-Gil, J. Molina-Gil, and A. Quesada-Arencibia, "A simulation study of new security schemes in mobile ad-hoc networks," in Proc. EUROCAWT, 2007. pp. 73-81
- S. Maki, T. Aura, and M. Hietalathi, "Robust membership management for ad-hoc groups," in Proc. NORDSEC, 2000
- D. Glynos, P. Kotzanikolaou, and C. Douligeris, "Preventing impersonation attacks in MANET with multifactor aythentication," in Prco. WIOPT, 2005, pp. 59-64
- P. Caballero-Gil and C. Hernandez-Goya, "Strong solutions to the identification problem," in Prco. COCOON, 2001, pp. 257-261
- B. Krishnamachari, S. Wicker, R. Bejar and C. Fernandez, "On the complexity of distributes self-configuration in wireless networks," Telecommunication Systems, vol. 22, pp. 33-59, 2002
- B. Vandegriend, "Finding hamiltonian cycies: AIgorithms, graphs and performance," M.S. thesis , University of Alberta, Canada, 1998
- I. B. Shields, "Hamilton cycie heuristics in hard graphs," Ph.D. thesis,North Carolina State University, 2004
- M. Krivelevich and B. Sudakov, "Sparse pseudo-random graphs are Hamiltonian," J. Graph Theory, vol. 42, no. 1, pp. 17-33, 2002 https://doi.org/10.1002/jgt.10065
- W. Diffie, P. C. van Oorschot, and M. J. Wiener, "Authentication and authenticatedkey exchanges," Designs, Codes and Cryptography, pp. 107-125, 1992
- Y. Hao, L. Haiyun, Y. Fan, L. Songwu, and Z. Lixia, "Security in mobilead-hoc networks: Challenges and solutions," Wireless Commun. vol. 11,no.l , pp.38-47, 2004 https://doi.org/10.1109/MWC.2004.1269716
- T. Gene, "Some issues in WSN, MANET, and cellular security," in Proc ARO Planning Workshop on Embedded Systems and Network Security, 2007, pp. 22-23
- X. Zhao, V. Ganapathy, N. Pissinou, and K. Makki, "Revisiting global timesynchronization," in Proc. IEEE GLOBECOM, 2007, pp. 1058-1063