References
- P. Michiardi, and R. Molva, "Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks," in Proc. of European Wireless 2002 Conference, 2002.
- Y. Zhang, and W. Lee. "Intrusion detection in wireless ad-hoc networks," in Proc. of 6th ACM Annual International Conference on Mobile Computing and Networking, pp.275-283, Aug.2000.
- S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. of 6th ACM Annual International Conference on Mobile Computing and Networking, pp.255-265, Aug.2000.
- S. Buchegger, and J-Y. L. Boudec, "Nodes Bearing Grudges: towards routing security, fairness and robustness in mobile ad hoc networks," in Proc. of 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp.403-410, Jan.2002.
- S. Buchegger, and J-Y. L. Boudec, "Performance analysis of the CONFIDANT Protocol," in Proc. of the 3rd ACM International Symposium on Mobile ad hoc networking & computing, pp.226-236, 2002.
- K. Chang, and J-L Chen, "A Survey of Trust Management in WSNs, Internet of Things and Future Internet," KSII Transactions on Internet and Information System, vol.6, no.1, pp.5-23, Jan.2012
- P. Kyul, H. Nishiyama, N.Ansari, and N. Kato, "certificate revocation to cope with false accusations in mobile ad hoc networks," in Proc. of 71st IEEE Vehicular Technology Conference, pp.1-5, May,2010.
- A. Kathirvel, and R. Srinivasan, "Self_USS:A self umpiring system for security in mobile ad hoc network," International Journal of Engineering and Technology, vol.2, no.2, pp.196-203, Apr.2010.
- C. Tseng, T. Song, P. Balasubramanyam, A. Ko, and K. Levitt, "A specification-based Intrusion Detection Model for OLSR", LNCS, vol.3858, pp.330-350, 2006.
- A. Mitrokotsa, R. Mavropodi, and C. Douligeris, "intrusion detection of packet dropping attacks in mobile ad hoc networks," in Proc. of International Conference on Intelligent Systems and Computing: Theory And Applications, pp.111-118, Jul.2006.
- O. Gonzalez, G. Ansa, M. Howarth, and G. Pavlou, "Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks," Journal of Internet Engineering, pp.181-192, Jun.2008.
- J. Sen, and K. Goswami, "An algorithm for detection of selfish nodes in wireless mesh networks," in Proc. of the International Symposium on Intelligent Information Systems and Applications, pp.571-576, Oct.2009.
- T. Anantvalee, and J. Wu, "A survey on intrusion detection in mobile ad hoc networks," Book Series Wireless Network Security, Springer, pp.170-196, 2007.
- V. Gokhole, S.K. Ghosh, and A. Gupta, "classification of attacks on wireless mobile ad hoc networks and vehicular ad hoc networks," Taylor and Francis Group, eBook, pp.195-225, 2011.
- C. K. Toh, E.C. Lee, and N.A. Ramos, "Next-Generation Tactical Ad Hoc Mobile Wireless Networks," NORHTROP GRUMMAN Technology Review Journal, pp.103-116, Spring/Summer 2004.
- J. Brand, and G. Hartwig, "Management of tactical ad hoc networks with C2 data models," in Proc. of MILCOM 2001, pp.915-922, Aug.2001.
- M. Popa, C. Moica, A.S. Popa, D. Mnerie, "Hierarchical Ad Hoc Networks", in Proc. of IEEE EUROCON 2007, The International Conference on "Computer as a Tool", pp.2509-2516, 2007.
- S-J. Yoon, S-H. Lee, Y-B. Ko, "Reliable dual-path geocasting for tactical ad hoc networks," in Proc. of MILCOM 2009, pp.1-7, Oct.2009.
- H. Wang, Y. Wang, J. Han, "A security architecture for tactical mobile ad hoc networks," in Proc. Of IEEE 2nd International Workshop on Knowledge Discovery and Data Mining, pp.312-315, Jan.2009.
- F.R. Yu, H. Tang, P.C. Mason, Wang Fei, "A hierarchical identity based key management scheme in tactical mobile ad hoc networks," IEEE Transactions on Network and Service Management, vol.7, no.4, pp.258-267, Dec.2010. https://doi.org/10.1109/TNSM.2010.1012.0362
- S-W. Lee, J. Y. Choi, K. W. Lim, Y-B. Ko, and B-H. Roh, "a reliable and hybrid multi-path routing protocol for multi-interface tactical ad hoc networks," in Proc. of MILCOM 2010, pp.2237-2242, Nov.2010.
- C. E. Perkins, and E. M. Royer, "Ad-hoc on-demand distance vector routing," in Proc. of 2nd IEEE Workshop on Mobile Computer Systems and Applications, pp.90-100, Feb., 1999.