05.01.2013 Views

Ad Hoc Networks : Technologies and Protocols - University of ...

Ad Hoc Networks : Technologies and Protocols - University of ...

Ad Hoc Networks : Technologies and Protocols - University of ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

266 Security in Mobile <strong>Ad</strong>-<strong>Hoc</strong> <strong>Networks</strong><br />

[11]<br />

[12]<br />

[13]<br />

[14]<br />

[15]<br />

[16]<br />

[17]<br />

[18]<br />

[19]<br />

[20]<br />

[21]<br />

[22]<br />

[23]<br />

W. W. Cohen. Fast effective rule induction. In Machine Learning: the<br />

12th International Conference, Lake Taho, CA, 1995. Morgan Kaufmann.<br />

J. R. Douceur. The sybil attack. In Proceedings <strong>of</strong> the 1st International<br />

Workshop on Peer-to-Peer Systems (IPTPS’02), pages 251–260, March<br />

2002. LNCS 2429.<br />

W. Du, J. Deng, Y. S. Han, <strong>and</strong> P. Varshney. A pairwise key pre-distribution<br />

scheme for wireless sensor networks. In Proceedings <strong>of</strong> the 10th ACM<br />

Conference on Computer <strong>and</strong> Communications Security (CCS’03), October<br />

2003.<br />

L. Eschenauer <strong>and</strong> V. D. Gligor. A key-management scheme for distributed<br />

sensor networks. In Proceedings <strong>of</strong> the 9th ACM Conference on Computer<br />

<strong>and</strong> Communication Security, Washington D.C., November 2002.<br />

Z.J. Haas <strong>and</strong> M. R. Pearlman. The zone routing protocol (ZRP) for ad hoc<br />

networks. Internet draft draft-ietf-manet-zone-zrp-04.txt, expired 2003,<br />

July 2000.<br />

C. Hsin <strong>and</strong> M. Liu. A distributed monitoring mechanism for wireless<br />

sensor networks. In ACM Workshop on Wireless Security (WiSe), Atlanta,<br />

GA, September 2002.<br />

Y. Hu, D. Johnson, <strong>and</strong> A. Perrig. SEAD: secure efficient distance vector<br />

routing for mobile wireless ad hoc networks. <strong>Ad</strong> <strong>Hoc</strong> <strong>Networks</strong>, 1(1): 175–<br />

192, July 2003.<br />

Y. Hu, A. Perrig, <strong>and</strong> D. Johnson. Ariadne: A secure on-dem<strong>and</strong> routing<br />

protocol for ad hoc networks. In Proceedings <strong>of</strong> ACM MOBICOM’02,<br />

2002.<br />

Y. Hu, A. Perrig, <strong>and</strong> D. Johnson. Packet leashes: A defense against<br />

wormhole attacks in wireless ad hoc networks. In Proceedings <strong>of</strong> IEEE<br />

INFOCOM’03, 2003.<br />

Y. Hu, A. Perrig, <strong>and</strong> D. Johnson. Rushing attacks <strong>and</strong> defense in wireless<br />

ad hoc network routing protocols. In Proceedings <strong>of</strong> ACM MobiCom<br />

Workshop - WiSe’03, 2003.<br />

Jean-Pierre Hubaux, L. Buttyan, <strong>and</strong> S. Capkun. The quest for security in<br />

mobile ad hoc networks. In Proceedings <strong>of</strong> the 2001 ACM International<br />

Symposium on Mobile <strong>Ad</strong> <strong>Hoc</strong> Networking <strong>and</strong> Computing (Mobi<strong>Hoc</strong><br />

2001), Long Beach, CA, October 2001.<br />

S. Jacobs <strong>and</strong> M. S. Corson. MANET authentication architecture. Internet<br />

draftdraft-jacobs-imep-auth-arch-01.txt, expired 2000, February 1999.<br />

T. Joachims. Making large-scale SVM learning practical, chapter 11.<br />

MIT-Press, 1999.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!