Acknowledgement
Supported by : 한국연구재단
References
- M. S. Corson and J. Macker, "Mobile ad hoc networking(MANET): routing protocol performance issues and evaluation considerations," RFC 250, Internet Engineering Task Force, Jan. 1999.
- M. Abolhasan, T. Wysocki, and E. Dutkiewicz, "A review of routing protocols for mobile ad hoc networks," Ad Hoc Networks, vol. 2, no. 1, pp. 1-22, Jan. 2004. https://doi.org/10.1016/S1570-8705(03)00043-X
- M. J Kim and Y. I Eom, "Efficient route maintenance scheme for wireless ad-hoc network environments," J. The Korean Institute of communications and Information Sciences(KICS), vol. 30, no. 8A, pp. 639-648, Aug. 2005.
- C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers," Newslett. ACM SIGCOMM Comput. Commun. Rev., vol. 24, no. 4, pp. 234-244, Oct. 1994.
- C. E. Perkins, "Ad hoc on demand distance vector (AODV) routing," IETF Internet Draft, July 2003.
- C. E. Perkins, "Ad hoc on demand distance vector (AODV) routing," in Proc. IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90-100, LA, USA, Feb. 1999.
- Z. J. Hass and M. R. Pearlman, "The Zone Routing Protocol(ZRP) for Ad Hoc Networks," draft-Ietf-manet-zone-zrp-02.txt, June 1999.
- M. Rezaee and M. Yaghmaee, "Cluster based Routing for Mobile Ad Hoc networks," J. comput. sci., vol. 8, no. 2, pp. 30-36, June 2009.
- S. Gupte and M. Singhal, "Secure routing in mobile wireless ad hoc networks," Ad Hoc Networks, vol. 1, no. 1, pp. 151-174, Jan. 2003. https://doi.org/10.1016/S1570-8705(03)00017-9
- Y. C. Hu and A. Perring, "A survey of secure wireless ad hoc routing," IEEE, Security & Privacy, vol. 2, no. 3, pp. 28-39, June 2004.
- L. Tamilselvan and V. Sankaranarayanan, "Prevention of Blackhole Attack in MANET," in Proc. IEEE Int. Conf. Wireless Broadband and Ultra Wideband Commun., pp. 21-26, Sydney, NSW, Aug. 2007.
- B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour "A survey of routing attacks in mobile ad hoc networks," IEEE Wireless Commun., vol. 14, no. 5, pp. 85-91, Oct. 2007. https://doi.org/10.1109/MWC.2007.4396947
- R. H. Khokhar, M. A. Ngadi, and S. Mandala "A review of current routing attacks in mobile ad hoc networks," Int. J. Comput. Sci. and Secur. (IJCSS), vol. 2, no. 3, pp. 18-29, June 2008.
- A. Burak and M. Ufuk, "A formal security analysis of secure AODV using model checking," in Proc. ISCN, pp. 38-44, Istanbul, June 2008.
- B. Swetha and S. A. Kummar & TVS P. Gupta, "Flaws in Endair-A secure routing protocol for manets," Special Issue of Int. J. Comput. Sci. & Inform. (IJCSI), vol. 2, no. 1, pp. 127-132, Jan. 2012.
- Y. C. Hu, A. Perring, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," J. Wireless Networks, vol. 11, no. 1-2, pp. 21-38, Jan. 2005. https://doi.org/10.1007/s11276-004-4744-y
- K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A secure routing protocol for ad hoc networks," in Proc. IEEE Int. Conf. Network Protocols, pp. 78-87, CA, USA, Nov. 2002.
- D. Benetti, M. Merro, and L. Vigano', "Model checking ad hoc network routing protocols: ARAN vs. Endaira," in Proc. IEEE Int. Conf. Software Engineering and Formal Methods (SEFM), pp. 191-202, Verona, Italy, Sep. 2010.
- A. F. A. Abidin, N. S. M. Usop, and N. H. N. Zulkifli, "An analysis on Endaira," Int. J. Comput. Sci. and Eng., vol. 2, no. 3, pp. 437-442, Mar. 2010.
- M. G. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proc. WISE, pp. 1-10, NY, USA, Sep. 2002.
- R. Poosarla, H. Deng, A. Ojha, and D. P. Agrawal, "A cluster Based Secure Routing Scheme for Wireless Ad Hoc Networks," in Proc. IEEE, Int. Conf. Perform., Comput., and Commun., pp. 171-175, OH, USA, April 2004.
- M. H. Guo, H. T. Liaw, D. J. Deng, and H. C. Chao, "Cluster-based secure communication mechanism in wireless ad hoc networks," Institution of Engineering and Technology Information Security, vol. 4, no. 4, pp. 352-360, Dec. 2010.