|
[1]Young-Bae Ko and Nitin H. Vaidya, “Location-aided routing (LAR) in mobile ad hoc networks,” journal of Wireless Networks, vol. 6, no. 4, pp. 307-321, 2000. [2]Raymond Pickholtz, Sajal K. Das, Ramon Caceres, and J. J. Garcia-Luna-Aceves, “Mitigating routing misbehavior in mobile ad hoc networks,” Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, MA, USA, pp. 255-265, 2000. [3]Yu-Chee Tseng, Sze-Yao Ni, Yuh-Shyan Chen, and Jang-Ping Sheu, “The broadcast storm problem in a mobile ad hoc network,” journal of Wireless Networks, vol. 8, no. 2-3, pp. 153-167, 2002. [4]S. Buchegger and J.-Y. Le Boudec, “A robust reputation system for p2p and mobile ad-hoc networks,” Proceedings of P2PEcon, Harvard Univ., Cambridge, MA, 2004. [5]D. Cokuslu, K. Erciyes, O. Dagdeviren, “A dominating set based clustering algorithm for mobile ad hoc networks,” Proceedings of the 6th International Conference of Computational Science, Reading, UK, pp. 571-578, 2006. [6]A.B. MaDonald, T.F. Znati, “A mobility-based framework for adaptive clustering in wireless ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 17, pp. 1466-1487, 1999. [7]I.I. ER, Winston K.G. Seah, “Mobility-based d-hop clustering algorithm for mobile ad hoc networks,” Proceedings of the Wireless Communications and Networking Conference (WCNC04), vol. 4, pp. 2359-2364, 2004. [8]C. Konstantopoulos, D. Gavalas, G. Pantziou, “A mobility aware technique for clustering on mobile ad-hoc networks,” Proceedings of the 8th International Conference on Distributed Computing and Networking (ICDCN06), Guwahati, India, pp. 397-408, 2006. [9]Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu and Jorjeta Jetcheva, “A performance comparison of multi-hop wireless ad hoc network routing protocols,” Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, Dallas, Texas, United States, pp. 85-97, 1998. [10]S. Corson and J. Macker, “Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations,” RFC 2501, 1999. [11]David B. Johnson and David A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, vol. 353, pp. 153-181, 1996 [12]C. Perkins, E. Belding-Royer, and S. Das., “Ad-hoc on-demand distance vector routing,” Proceedings of Mobile Computing Systems and Applications. Second IEEE Workshop on, New Orleans, L.A., USA, pp. 90-100, 1999. [13]Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, MA, USA, pp. 255-265, 2000. [14]Djamel Djenouri and Nadjib Badache, “On eliminating packet droppers in MANET: A modular solution,” Ad Hoc Networks, vol. 7, no. 6, pp. 1243-1258, 2009. [15]Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, and Roshan K. Thomas, “E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks,” Ad Hoc Networks, vol. 7, no. 6, pp. 1156-1168, 2009. [16]Jie Li, Ruidong Li, and Jien Kato, “Future trust management framework for mobile ad hoc networks,” Communications Magazine, IEEE, vol. 46, no. 4, pp. 108-114, 2008. [17]Yan Lindsay Sun, Zhu Han, and K. J. Ray Liu, “Defense of trust management vulnerabilities in distributed networks,” Communications Magazine, IEEE, vol. 46, no. 2, pp. 112-119, 2008. [18]George Theodorakopoulos and John S. Baras, “On trust models and trust evaluation metrics for ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 318-328, 2006. [19]Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz, and Farouk Kamoun, “CASAN: Clustering algorithm for security in ad hoc networks,” Journal of Computer Communications, vol. 31, no. 13, pp. 2972-2980, 2008.
|