[1] Aad, I., Hubaux, J.P., Knightly, E.W., 2004. Denial of Service Resilience in Ad Hoc Networks. MobiCom’04, Sept. 26~Oct. 1, 2004, Philadelphia, Pennsylvania, USA, p.43-57.
[2] Akyildiz, I.F., Wang, X.D., Wang, W.L., 2005. Wireless mesh networks: a survey. Computer Networks, 47(4):445-487.
[3] Fan, G., Zhang, J., 2004. Maximizing sensor reuse based on new geometric concepts. Journal of Information Science and Engineering (JISE), Special Issue of Mobile Computing, 20:477-489.
[4] Gao, Y, Rong, H., Tong, F., Luo, Z., Huang, J., 2003. Adaptive job scheduling for a service grid using a genetic algorithm. GCC, (2):65-72.
[5] Hu, Y., Johnson, D., Perrig, A., 2002. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Proceedings of the 4th IEEE (WMCSA), IEEE, Calicoon, NY, p.3-13.
[6] Hu, Y., Perrig, A., Johnson, D., 2005. ARIADNE: a secure on demand routing protocol for ad hoc networks. Wireless Networks, 11(1-2):21-38.
[7] Newport, C., 2004. Simulating Mobile Ad Hoc Networks: A Quantitative Evaluation of Common MANET Simulation Models. Dartmouth College Computer Science Technical Report, TR2004-504.
[8] Papadimitratos, P., Haas, Z.J., 2002. Secure Routing for Mobile Ad Hoc Networks. Proceedings from the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, p.27-31.
[9] Sanzgiri, K., Dahill, B., Levine, B.N., Belding-Royer, E.M., 2002. A Secure Routing Protocol for Ad Hoc Networks. Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP), Paris, France, p.78-89.
[10] Venkatraman, L., Agrawal, D.P., 2003. Strategies for enhancing routing security in protocols for mobile ad hoc networks. J. Parallel Distributed Computing, 63(2):214-227.
[11] Yi, S., Naldurg, P., Kravets, R., 2002. A Security-aware Ad Hoc Routing Protocol for Wireless Networks. The 6th World Multi-Conference on Systemic, Cybernetics and Informatics (SCI 2002), Orlando, Florida.
Open peer comments: Debate/Discuss/Question/Opinion
<1>