참고문헌
- Wei Liu, Hiroki Nishiyama, Nirwan Ansari, Jie Yang and Nei Kato, "Cluster-based Certificate Revocation withVindication Capability for Mobile Ad Hoc Networks", IEEE Transactions On Parallel And Distributed Systems, vol.24,no.2,pp.239-249,2013. https://doi.org/10.1109/TPDS.2012.85
- Sevil Sen, John A.Clark and Juan E.Tapiador, "Security of Self-Organizing NetworksMANET, WSN, WMN, VANET", Auerbach Publications, 2010, 978-1-4398-1920-3.
- Hongmei Deng, Wei Li, and Dharma P. Agrawal, "Routing Security in Wireless Ad Hoc Networks", IEEE Communications Magazine, vol.40, no.10, pp.70-75, 2002. https://doi.org/10.1109/MCOM.2002.1039859
- Wensheng Zhang, R. Rao, Guohong Cao and George Kesidis, "Secure Routing In Ad Hoc Networks and A Related Intrusion Detection Problem", IEEE Military Communications, vol.2, pp.735-740, 2003.
- Anand Patwardhan, Jim Parker and Anupam Joshi, "Secure Routing and Intrusion Detection in Ad Hoc Networks", IEEE Pervasive Computing and Communications, PP.191-199, 2005.
- Martin K Parmar and Harikrishna B Jethva, "Survey on Mobile ADHOC Network and Security Attacks on Network Layer", International Journal of Advanced Research in Computer Science and Software Engineering, vol.3, no.11, pp.708-716, 2013.
- Yashar Najaflou, Behrouz Jedari, Feng Xia, Laurence T. Yang and Mohammad S. Obaidat, "Safety Challenges and Solutions in Mobile Social Networks", IEEE Systems Journal, no.99, pp.1-21, 2013.
- Ghanshyam Prasad Dubey, Prof. Amit Sinhal and Prof. Neetesh Gupta, "Network Performance investigation in Presence of Multiple Vital Node and IDS in MANET", International Journal of Computer Science and Information Technologies, vol.3, no.3, pp.3879-3883, 2012.
- A.Jayanand and Prof.Dr.T.Jebarajan, "Performance Investigation and Analysis of Secured MANET Routing Protocols", International Journal of Computer Science and Information Technologies, vol.3, no.2, pp.3512-3516, 2012.
- Suman Deswal and Sukhbir Singh, "Implementation of Routing Security Aspects in AODV", International Journal of Computer Theory and Engineering, vol.2, no.1, pp.135-138, 2010.
- Yih-Chun Hu, David B. Johnson and Adrian Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks", Elsevier B.V. Ad Hoc Networks, vol.1, pp.175-192, 2003. https://doi.org/10.1016/S1570-8705(03)00019-2
- Yih-Chun Hu and Adrian Perrig, "A Survey of SecureWireless Ad Hoc Routing", IEEE Security & Privacy, vol.2, no.3, pp.28-39, 2004.
- Levente Buttyan and Ta Vinh Thong, "Formal verification of secure ad-hoc network routing protocols using deductive model-checking", IEEE Wireless and Mobile Networking, pp.1-6, 2010.
- V.Balakrishnan, V.Varadharajan, et al. "Fellowship: Defense Against Flooding and Packet Drop Attacks In MANET," Network Operations and Management Symposium, NOMS 2006, pp. 1-4, 2006.
- Johann van der Merwe, Dawoud, et al. "Trustworthy Key Management for Mobile Ad Hoc Networks", ACM Computing Surveys (CSUR), Volume 39, Issue 1, 2007.
- B.Wu, J.Chen, et al. "A Survey of Attacks andCountermeasures in Mobile Ad Hoc Networks," Wireless/Mobile Network Security, Springer, vol. 17, 2006.
- D. Wang, M. Hu, H. Zhi, "A Survey of Secure Routing in Ad Hoc Networks," IEEE Ninth International Conference on Web-Age Information Management, 2008, (WAIM '08), pp.482-486, July 2008.
- K.Sanzgiri, D.LaFlamme, et al. "Authenticated Routing for Ad Hoc Networks," Proceedings of IEEE Journal on Selected Areas in Communications, vol. 23, no. 3, March 2005.
- Y.C.Hu, A.Perrig, et al."Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proc. MobiCom'02, Atlanta, GA, pp. 12-13 September 2002.
- S. Madhavi, Dr. Tai Hoon Kim, " An intrusion detection system in mobile Ad hoc networks", International Journal of Security and Its Applications Vol. 2, No.3, July, 2008.
- S. Capkun, L. Buttya, et al."Self-organized publickey management for mobile ad hoc networks," IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan.-Mar., 2003. https://doi.org/10.1109/TMC.2003.1195151
- Yasir Abdelgadir Mohamed*, Azween B. Abdullah, "Security Mechanism For MANETS",Journal of Engineering Science and Technology, Vol. 4, No. 2, pp: 231-242,2009. jestec.taylors.edu.my/.../Vol_4_2_231-242_YASIR%20ABDELGADIR..
- H. Huang and S. F. Wu, "An approach to certificate path discovery in mobile ad hoc networks," 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Oct. 2003.
- J. Huang and D. Nicol, "A calculus of trust and its application to PKI and identity management," ACM 8th Symposium on Identity and Trust on the Internet, Gaithersburg, MD, USA, April 2009. citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.210.3881
- N. V. Vinh, M.-K. Kim, H. Jun, and N. Q. Tung, "Group-based public-key management for selfsecuring large mobile ad-hoc networks," Int'l Forum on Strategic Technology, pp. 250-253, Oct. 2007.
- Hua Yang and Zhi-yuan Li, "Simulation and analysis of a modified AODV routing protocols", Computer Science and Network Technology (ICCSNT), vol. 3, pp. 1440-1444, 2011.
피인용 문헌
- AODVCS, a new bio-inspired routing protocol based on cuckoo search algorithm for mobile ad hoc networks pp.1572-8196, 2017, https://doi.org/10.1007/s11276-017-1485-2