|
[1]T. Liu and K. Liu, “Improvements on DSDV in Mobile Ad Hoc Networks,” Wireless Communications, Networking and Mobile Computing, pp. 1637-1640, Shanghai, China, 2007. [2]P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum and L. Viennot, “Optimized link state routing protocol for ad hoc networks,” in Proceedings of 5th IEEE Multi Topic Conference, pp. 62-68, New York, United States, 2001. [3]C. E. Perkins, E. M. Belding-Royer and S. R. Das, “Ad hoc On-Demand Distance Vector Routing,” in Proceedings of the Second IEEE Workshop Mobile Computing Systems and Applications, pp. 90-100, New Orleans, Los Angles, 1999. [4]D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, Kluwer Academic Publishers, pp. 153-181, 1996. [5]V. D. Park and M. S. Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks,” in Proceedings of IEEE INFOCOM ‘97, pp.1405-1355, Kobe, Japan, April, 1997. [6]Z. J. Haas, “A new routing protocol for the reconfigurable wireless networks,” in Proceedings of the 6th IEEE International Conference on Universal Personal Communications, Vol.2, pp. 562-566, San Diego, California, United States, 1997. [7]S. Denh, C. Rex and B. Lichun, “ODAR: On-Demand Anonymous Routing in Ad Hoc Networks,” in Proceedings of the 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 267-276, Vancouver, British Columbia, Canada, October, 2006. [8]M. C. Chiang, “Hash-based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks,” Master thesis, National Taiwan University of Science and Technology, Taipei, Taiwan, June, 2010. [9]J. Kong and X. Hong, “ANODR: Anonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks,” in Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 291-302, New York, United States, 2003. [10]B. Zhu, Z. Wan, M. S. Kankanhalli, F. Bao, and R. H. Deng, “Anonymous Secure Routing in Mobile Ad-hoc Networks,” in Proceedings of the 29th IEEE International Conference on Local Computer Networks, pp. 102-108, Tampa, Florida, United States, November, 2004. [11]R. Song, L. Korba, and G. Yee, “AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad-Hoc Networks,” in Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 33-42, Alexandria, Virginia, United States, November, 2005. [12]K. El-Khatib, L. Korba, R. Song, and G. Yee, "Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks," in Proceedings of the International Conference on Parallel Processing Workshops, pp. 359-366, Kaohsiung, Taiwan, October, 2003. [13]A. Boukerche, K. El-Khatib, L. Korba, and L. Xu, "SDAR: A Secure Distributed Anonymous Routing Protocol for Ad Hoc Wireless Networks," in Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, pp. 618-624, Tampa, Florida, United States, November, 2004. [14]J. Kong, X. Hong, and M. Gerla, "ASR is a variant of ANODR," technical report CSD-TR050014, University of California, Los Angeles, United States, 2005. [15]“QualNet Developer | network modeling & simulation software | Scalable Network Technologies”, http://www.scalable-networks.com/products/qualnet/, Scalable Networks Technologies, Inc. [16]“QualNet 5.0 Programmer’s Guide”, http://www.scalable-networks.com, Scalable Network Technologies, Inc. [17]J. Broch, D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva, “A performance comparison of multi-hop wireless ad hoc network routing protocols,” In Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking ‘98, pp. 85-97, New York, United States, 1998. [18]W. Dai, “Crypto++ 5.6.0 Benchmarks”, http://www.cryptopp.com/benchmarks.html, 2009.
|