References
[1] C. Perkins and E. Royer, “Ad Hoc On-Demand Distance
Vector Routing”, 2nd IEEE Wksp. Mobile Comp. Sys. and
Apps., 1999.
[2] D. Johnson and D. Maltz, “Dynamic Source Routing in
Ad Hoc Wireless Networks,” Mobile Computing, T. Imielinski
and H. Korth, Ed., Kluwer, 1996.
[4]. B. Schneier, Secret and Lies, Digital Security in a
Networked World, Wiley, 2000.
[5]. Y. Hu, A. Perrig, and D. Johnson, “Ariadne: A Secure
On-demand Routing Protocol for Ad Hoc Networks”, ACM
MOBICOM, 2002.
[6]. M. Zapata, and N. Asokan, “Securing Ad Hoc Routing
Protocols”, ACM WiSe, 2002.
[7]. B. Dahill et al., “A Secure Protocol for Ad Hoc
Networks”, IEEE ICNP, 2002.
[8]. Y. Hu, A. Perrig, and D. Johnson, “Packet Leashes: A
Defense against Wormhole Attacks in Wireless Networks”,
IEEE INFOCOM, 2002.
[9]. N. Borisov, I. Goldberg, and D. Wagner, “Intercepting
Mobile Communications: The Insecurity of 802.11”, ACM
MOBICOM, 2001.
[10]. V. Gupta, S. Krishnamurthy and M. Faloutsos, “Denial
of Service Attacks at the MAC Layer in Wireless Ad HocNetworks”, IEEE MILCOM, 2002.
[11]. P. Kyasanur and N. Vaidya, “Detection and Handling
of MAC Layer Misbehavior in Wireless Networks”, DCC,
2003.
[12]. C. Perkins and P. Bhagwat, “Highly Dynamic
Destination- Sequenced Distance- Vector Routing (DSDV)
for Mobile Computers”, ACM SIGCOMM, 1994.
[13]. P. Papadimitratos and Z. Haas, “Secure Routing for
Mobile Ad Hoc Networks”, CNDS, 2002.
[14]. A. Perrig et al., “The TESLA Broadcast Authentication
Protocol“, RSA CryptoBytes, Vol. 5, No. 2, 2002.
[15]. Y. Hu, D. Johnson and A. Perrig, “Sead: Secure
Efficient Distance Vector Routing for Mobile Wireless Ad
Hoc Networks,” IEEE WMCSA, 2002.
[16]. P. Papadimitratos and Z. Haas, “Secure Link State
Routing for Mobile Ad Hoc Networks,” IEEE Wksp. Security
and Assurance in Ad Hoc Networks, 2003.
[17]. B. Awerbuch et al., “An On-Demand Secure Routing
Protocol Resilient to Byzantine Failures,” ACM WiSe, 2002.
[18]. S. Marti et al., “Mitigating Routing Misbehavior in
Mobile Ad Hoc Networks,” ACM MOBICOM, 2000.
[19]. H. Yang, X. Meng and S. Lu, “Self-Organized Network
Layer Security in Mobile Ad Hoc Networks,” ACM WiSe,
2002.
[20]. J. Kong et al., “Providing Robust and Ubiquitous
Security Support for Mobile Ad-Hoc Networks,” IEEE ICNP,
2001.
[21]. G. Noubir and G. Lin, “Low-Power DoS Attacks in Data
Wireless LANs and Countermeasures,” ACM MobiHoc,
Poster Session, 2003.
[22]. A. Stubblefield, J. Ioannidis and A. Rubin, “Using the
Fluhrer, Mantin, and Shamir Attack to Break WEP”, NDSS,
2002.
[23]. S. Fluhrer, I. Mantin and A. Shamir, “Weakness in the
Key Scheduling Algorithm of RC4”, 8th Annual Wksp.
Sel. Areas in Cryptography, 2001.
[24]. IEEE Std. 802.11i/D30, “Wireless Medium Access
Control (MAC) and Physical Layer (PHY) Specifications:
Specification for Enhanced Security”, 2002.