

Implementation of EESCP Protocol in Mobile Adhoc Networks
Abstract
Keywords
References
F. Anjum and P. Mouchtaris. Security for Wireless Ad Hoc Networks. John Wiley & Sons. Inc., USA, 2007.
P. Brutch and C. Ko. Challenges in intrusion detection for wireless adhoc networks. In proc. of the IEEE Symposium on Applications and the Internet (SAINT) Workshop, 2003.
P. Ning and K. Sun. How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. In proc. of the IEEE Information Assurance Workshop, 2003.
H.safa,Mirza.O ,Artail.H. A Dynamic Energy Efficient Clustering Algorithm for MANET.IEEE International Conference on Wireless and Mobile Computing, 2008.
Tomas Johansson and LenkaMotyˇckov´.On Clustering in Ad Hoc Networks. Division of Computer Science and Networking Lule°a University of Technology August 17, 2003.
S. Buchegger and J. L. Boudec. Performance analysis of the CONFIDANT protocol (cooperation of nodes - fairness in dynamic adhoc networks). In proc. of the ACM MOBIHOC, 2002.
T. Anantvalee and J. Wu. A survey on intrusion detection in mobile ad hoc networks. Wireless/Mobile Network Security, 2006.
Y. Huang and W. Lee. A cooperative intrusion detection system for ad hoc networks. In proc. of the ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003
Y. Huang and W. Lee. A cooperative intrusion detection system for adhoc networks. In proc. of the ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In proc. of the ACM International Conference on Mobile Computing and Networking (MobiCom), 2000.
L.Hurwicz and S. Reiter. Designing Economic Mechanisms. Cambridge University Press, 1st edition, 2008.M.H.Guo, H.T.Liaw, D.J.Deng H.C.Chao.Cluster based secure communication mechanism in wireless adhoc networks.In proc of the IET Information Security .2010.
P. Krishna, N.H.Vaidya, M.Chatterjee, and D.K.Pradhan. A clusterbased approach for routing in dynamic networks. In proc. of the ACM SIGCOMM Computer Communication Review, 1997.
Ayan Mahalanobis.Diffie-Hellman Key Exchange Protocol,its Generalization and Nilpotent Groups. Florida Atlantic University, August 2005
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.