REFERENCES

1. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding Royer. A secure routing protocol for ad hoc networks. Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP'02), Paris, France, pp. 78–89, 2002.

2. M. G. Zapata and N. Asokan. Securing ad hoc routing protocols. In Proceedings of the ACM International Conference on Mobile Computing and Networking, Atlanta, GA, USA, pp. 1–10, 2002.

3. Y. C. Hu, A. Perrig, and D. B. Johnson. Ariadne: a secure on demand routing protocol for ad hoc networks. Proceedings of the ACM International Conference on Mobile Computing and Networking, Atlanta, Georgia, USA, pp. 12–23, 2002.

4. P. Papadimitratos and Z. J. Haas. Secure routing for mobile ad hoc networks. Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, TX, 2002.

5. S. Capkun and J. P. Hubaux. BISS: building secure routing out of an incomplete set of security associations. In Proceedings of the ACM Workshop on Wireless Security, San Diego, CA, USA, pp. 21–29, 2003.

6. Y. Liu and Y. R. Yang. Reputation propagation and agreement in mobile ad hoc networks. In Proceedings of IEEE Wireless Communications and Networking (WCNC'03), New Orleans, USA, pp. 1510–1515, 2003.

7. A. A. Pirzada, A. Datta, and C. McDonald. Propagating trust in ad hoc networks for reliable routing. Proceedings of IEEE International Workshop on Wireless Ad-Hoc Networks, Oulu, Finland, pp. 58–62, 2004.

8. ...

Get Mobile Intelligence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.