References
[1]. K. Al Agha, M.H. Bertin, T. Dang, A. Guitton, P. Minet, T.
Val, and J.B. Viollet, (2009). “Which wireless technology for
industrial wireless sensor networks? The development of
OCARI technol”. IEEE Trans. Ind. Electron.,Vol. 56, No. 10,
pp. 4266–4278.
[2]. R. Akbani, T. Korkmaz, and G. V. S. Raju, (2012).
“Mobile Ad hoc Network Security”. Lecture Notes in
Electrical Engineering, New York:Springer-Verlag, Vol. 127,
pp. 659–666.
[3]. R. H. Akbani, S. Patel, and D. C. Jinwala, (2012). “DoS
nd attacks in mobile ad hoc networks: A survey”. in Proc. 2
Int. Meeting ACCT, Rohtak, Haryana, India, pp. 535–541.
[4]. T. Anantvalee and J. Wu, (2008). “A Survey on Intrusion
Detection in Mobile Ad Hoc Networks”, in Wireless/Mobile
Security. New York: Springer- Verlag,
[5]. L. Buttyan and J. P. Hubaux, (2007). Security and
Cooperation in Wireless Networks. Cambridge, U.K.:
Cambridge Univ. Press.
[6]. D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L.
Benini, (2008). “Modeling and optimization of a solar
energy harvester system for self-powered wireless sensor
networks”. IEEE Trans. Ind. Electron., Vol. 55, No. 7, pp.
2759–2766.
[7]. V. C. Gungor and G. P. Hancke, (2009). “Industrial
wireless sensor networks:Challenges, design principles,
and technical approach”. IEEE Trans. Ind.Electron., Vol.
56, No. 10, pp. 4258–4265.
[8]. Y. Hu, D. Johnson and A. Perrig, (2002). “SEAD: Secure efficient distance vectorrouting for mobile wireless ad hoc
th networks”. in Proc. 4 IEEE Workshop Mobile Comput. Syst.
Appl. pp. 3–13.
[9]. Y. Hu, A. Perrig, and D. Johnson, (2002). “ARIADNE: A
secure on-demand routing protocol for ad hoc networks”.
th in Proc. 8 ACM Int. Conf. MobiCom, Atlanta, GA, pp.
12–23.
[10]. G. Jayakumar and G. Gopinath, (2007). “Ad hoc
mobile wireless networks routing protocol—A review”.
Journal on Computer Science., Vol. 3, No. 8, pp.
574–582.
[11]. D. Johnson and D. Maltz, (1996). Dynamic Source
Routing in ad hoc wireless networks in Mobile Computing.
Norwell, MA: Kluwer, ch. 5, pp. 153–181.
[12]. N. Kang, E. Shakshuki, and T. Sheltami, (2010).
th “Detecting misbehaving nodes in MANETs”. in Proc. 12
Int. Conf. iiWAS, Paris, France, pp. 216–222.
[13]. N. Kang, E. Shakshuki, and T. Sheltami, (2011).
“Detecting forged acknowledgements in MANETs”. in
th Proc. IEEE 25 Int. Conf. AINA, Biopolis, Singapore, pp.
488–494.
[14]. K. Kuladinith, A. S. Timm-Giel, and C. Görg, (2004).
“Mobile ad-hoc communications in AEC industry”.
Journal on Information Technology. Vol. 9, pp. 313–323.
[15]. J.-S. Lee, (2008). “A Petri net design of command
filters for semi autonomous mobile sensor networks”. IEEE
Trans. Ind. Electron., Vol. 55, No. 4, pp. 1835–1841.
[16]. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan,
(2007). “An acknowledgment-based approach for the
detection of routing misbehavior in MANETs”. IEEE Trans.
Mobile Comput., Vol. 6, No.5, pp. 536–550.
[17]. S. Marti, T. J. Giuli, K. Lai, and M. Baker, (2000).
“Mitigating routing misbehavior in mobile ad hoc
th networks”, in Proc. 6 Annu. Int. Conf. Mobile Comput.
Netw., Boston, MA, pp. 255–265.
[18]. A. Menezes, P. Van Oorschot, and S. Vanstone,
(1996). Handbook of Applied Cryptography. Boca Raton,
FL: CRC, T-37.
[19]. N. Nasser and Y. Chen, (2007). “Enhanced intrusion
detection systems for discovering malicious nodes in mobile ad hoc network”. in Proc. IEEE Int.Conf. Commun.,
Glasgow, Scotland, pp. 1154–1159.
[20]. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T.
Karygiannis, (2005). “Secure routing and intrusion
rd detection in ad hoc networks”, in Proc. 3 Int.
Conf.Pervasive Comput. Commun., pp. 191– 199.
[21]. R. Rivest, A. Shamir, and L. Adleman, (1983). “A
method for obtaining digital signatures and public key
cryptosystems”, Commun. ACM, Vol. 21, No. 2, pp.
120–126.
[22]. J. G. Rocha, L. M. Goncalves, P. F. Rocha, M. P. Silva,
and S. Lanceros-Mendez, (2010). “Energy harvesting
from piezoelectric materials fully integratedin footwear”.
IEEE Trans. Ind. Electron., Vol. 57, No. 3, pp. 813–819.
[23]. T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A.
Mahmoud, (2009). “Video transmission enhancement in
presence of misbehaving nodes in MANETs”. International
Journal on Multimedia Syst., Vol. 15, No. 5, pp. 273–282.
[24]. A. Singh, M. Maheshwari, and N. Kumar (2011). “Security and trust management in MANET”. in Communications in Computer and Information Science, Vol. 147. New York: Springer-Verlag, pt. 3, pp. 384–387.
[25]. B. Sun, (2004). “Intrusion detection in mobile ad hoc networks”. Ph.D. Dissertation, Texas A&M Univ., College Station, TX.
[26]. K. Stanoevska-Slabeva and M. Heitmann, (2003). “Impact of mobile ad-hoc networkson the mobile value nd system”, in Proc. 2 Conf. m-Bus., Vienna, Austria.
[27]. A. Tabesh and L. G. Frechette, (2010). “A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micropower generator”. IEEE Trans. Ind. Electron., Vol. 57, No. 3, pp. 840–849.
[28]. M. Zapata and N. Asokan, (2002). “Securing ad hocrouting protocols”. in Proc.ACM Workshop Wireless Secur., pp. 1–10.
[30]. Botan. A Friendly C++ Crypto Library. Reterived from: http://botan.randombit.net/
[31]. Nat. Inst. Std. Technol., (2009). Digital Signature Standard (DSS) Federal Information Processing Standards Publication, Gaithersburg, MD, Digital Signature Standard (DSS).
[32]. TIK WSN Research Group. The Sensor Network Museum—Tmote Sky. Reterived from: http://www. snm.ethz.ch/Projects/TmoteSky
[33]. Y. Kim, (2008). “Remote sensing and control of an irrigation system using a distributed wireless sensor network”. IEEE Trans. Instrum. Meas., Vol. 57, No. 7, pp. 1379–1387.
[34]. Ethadi M. Shakshuki, Nan kang and Tarek R. Sheltami, (2013). “EAACK—A Secure Intrusion-Detection System for MANETs”. IEEE Transaction on Industrial Electronics, Vol. 60, No. 3.