|
[1]Ting Liu, Kai Liu, "Improvements on DSDV in Mobile Ad Hoc Networks," Wireless Communications, Networking and Mobile Computing, pp.1637-1640, Sept. 21-25, 2007. [2]Ching-Chuan Chiang, Hsiao-Kuang Wu, Winston Liu, Mario Gerla, "Routing in Clustered Multihop Mobile Wireless Networks with Fading Channel," Proceedings of IEEE Singapore International Conference on Networks, Singapore, 1997. [3]P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, L. Viennot, "Optimized link state routing protocol for ad hoc networks," Multi Topic Conference, pp.62-68, 2001. [4]V. D. Park, M. S. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," INFOCOM '97, Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Vol.3, pp.1405-1355, Apr. 7-12, 1997. [5]M. Scott Corson, Anthony Ephremides, "A Distributed Routing Algorithm for Mobile Wireless Networks," Wireless Networks, Vol.1, No.1, pp.61-81, Feb., 1995. [6]Chai-Keong Toh, "Associativity-Based Routing for Ad Hoc Mobile Networks," IEEE 15th Annual International Phoenix Conference on Computers and Communications, IEEE IPCCC 1996, pp.480-486, Mar. 27-29, 1996. [7]Lianyu Zhao, Haiying Shen, "A Low-cost Anonymous Routing Protocol in MANETs," Proceedings of the International Conference on Computer Communications and Networks, San Francisco, CA, United States, pp.1-6, Aug. 3-6, 2009. [8]D. Johnson, Y. Hu, D. Maltz, "The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4," Network working Group Request for Comments: 4728, Feb., 2007. [9]C.E. Perkins, E.M. Royer, "Ad Hoc On-Demand Distance Vector Routing," Proceedings of the Second IEEE Workshop Mobile Computing Systems and Applications, New Orleans, LA, pp.90-100, Feb. 25-26, 1999. [10]Djamel Djenouri, Nadjib Badache, "MANET: Selfish Behavior on Packet Forwarding," Encyclopedia of Wireless and Mobile Communications, 2008. [11]Pietro Michiardi, Refik Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," The 6th IFIP Communication and Multimedia Security Conference CMS 2002, Portoroz, Slovenia, Sept. 26-27, 2002. [12]Sonja Buchegger, Jean-yves Le Boudec, "Performance analysis of the confidant protocol: Cooperation of nodes - fairness in dynamic ad-hoc networks," 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), Lausanne, Switzerland, June 9-11, 2002. [13]Hao Yang, Xiaoqiao Meng, Songwu Lu, "Self-organized network layer security in mobile ad hoc networks," ACM MOBICOM Wireless Security Workshop (WiSe 2002), Atlanta, GA, Sept. 28, 2002. [14]H. Miranda, L. Rodrigues, "Friends and foes: preventing selfishness in open mobile ad hoc networks," The 23rd IEEE International Conference on Distributed Computing Systems (ICDCS 2003), Providence, RI, pp.440-445, May 19-22, 2003. [15]Levente Buttyan, Jean-Pierre Hubaux, "Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks," Swiss Federal Institute of Technology, Lausanne, Switzerland, Tech. Rep. DSC/2001/001. Jan. 2001. [16]Sanjay K. Dhurandher, Mohammad S. Obaidat, Karan Verma, Pushkar Gupta, Pravina Dhurandher, "FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems," IEEE Systems Journal, Vol.5, No.2, pp.176-188, June, 2011. [17]Sergio Marti, T.J Giuli, Kevin Lai, Mary Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp.255-265, 2000.
|