Cite

[1] Bagrodia R., Meyerr R., PARSEC: A Parallel Simulation Environment for Complex System, UCLA technical report, 1997.Search in Google Scholar

[2] Broch, J., Maltz A.D., Johnson B.D., Hu C.Y., Jetcheva J., A performance comparison of multi-hop wireless ad hoc network routing protocols, Journal of Mobile Computing and Networking, 1998, 85-97.10.1145/288235.288256Search in Google Scholar

[3] Capkun S.,Buttya L., Hubaux J.P., Self-Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions On Mobile Computing, 2, 1, 2003,1-13.10.1109/TMC.2003.1195151Search in Google Scholar

[4] Corson S., Macker J., Mobile Ad hoc Networking (MANET): routing protocol performance issues and evaluation considerations, Network Working Group, RFC:2501,1999.10.17487/rfc2501Search in Google Scholar

[5] Eastlake D., Jones P., US secure hash algorithm 1 (SHA1). Network Working Group.RFC-3174, 2001.10.17487/rfc3174Search in Google Scholar

[6] Grobler T. L., Penzhorn W. T., Fast decryption methods for rsa cryptosystem, In 7th AFRICON Conference in Africa,1, 2004,361-364.Search in Google Scholar

[7] Huang Q., Cukier J., Kobayashi H., Liu B., Zhang J., Fast authenticated key establishment protocols for self-organizing sensor networks, Mitsubishi Electric Research Laboratories,2004.10.1145/941350.941371Search in Google Scholar

[8] Lamport L., Password authentication with insecure communication. Communications of ACM, 24,11,1981,770-772.10.1145/358790.358797Search in Google Scholar

[9] Nekkanti R.K., Lee C.W., Trust based adaptive on demand ad hoc routing protocol. In: Proceedings Of The 42nd Annual Southeast Regional Conference, 2004, 88-93.10.1145/986537.986558Search in Google Scholar

[10] Rivest R.L., Shamir A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems, Communications of ACM, 21,2, 1978, 120-126.10.1145/359340.359342Search in Google Scholar

[11] Saha H.N., Bhattacharyya D., Banerjee B., Mukherjee S., Singh R. and Ghosh D., Self-Organized key management based on fidelity relationship list and dynamic path. International Journal of Application or Innovation in Engineering & Management (IJAIEM),3,7,2014,97-100.Search in Google Scholar

[12] Saha H.N, Bhattacharyya D., Banerjee B., Mukherjee S., Singh R., Ghosh D., A review on attacks and secure routing protocols in MANET, In CIBTech, International Journal of Innovative Research and Review (JIRR), 1, 2, 2013,12-31.Search in Google Scholar

[13] Saha H N., Bhattacharyya D., Banerjee P K., Fidelity based on demand secure (FBOD) routing in mobile adhoc network, International Journal of Advanced Computer Science and Applications,Special Issue on Wireless & Mobile Networks(IJACSA), 2011,26-34.Search in Google Scholar

[14] Sanzgiri K., Dahill B., Levine B., Belding-Royer E., A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE International Conference on Network Protocols (ICNP), 2002,78-87.Search in Google Scholar

[15] Zapata M., Asokan N., Securing ad hoc routing protocols. In: Proceedings of the ACM Workshop on Wireless Security (WiSe), 2002,1-10.10.1145/570681.570682Search in Google Scholar

[16] Zeng, X., Bagrodia. R., Gerla M., GloMoSim: a library for parallel simulation of large-scale wireless networks, In Proc. of 12th Workshop on Parallel and Distributed Simulation (PADS),1998,154 - 161. 10.1145/278009.278027Search in Google Scholar

eISSN:
2300-3405
Idioma:
Inglés
Calendario de la edición:
4 veces al año
Temas de la revista:
Computer Sciences, Artificial Intelligence, Software Development