

Cluster-Based License Revocation with Vindication Ability for Mobile Ad Hoc Networks
Abstract
Keywords
References
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in Mobile Ad Hoc Networks: Challenges and Solutions,” IEEE Wireless Comm., vol. 11, no. 1, pp. 38-47, Feb. 2004.
P.Sakarindr and N. Ansari, “Security Services in Group Communications Over Wireless Infrastructure, Mobile Ad Hoc, and Wireless Sensor Networks,” IEEE Wireless Comm., vol. 14 , no. 5, pp. 8-20, Oct. 2007.
A.M. Hegland, E. Winjum, C. Rong, and P. Spilling, “A Survey of Key Management in Ad Hoc Networks,” IEEE Comm. Surveys and Tutorials, vol. 8, no. 3, pp. 48-66, Third Quarter 2006.
L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks,” IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
L. Zhou, B. Cchneider, and R. Van Renesse, “COCA: A Secure Distributed Online Certification Authority,” ACM Trans. Computer Systems, vol. 20, no. 4, pp. 329-368, Nov. 2002.
H. Chan, V. Gligor, A. Perrig, and G. Muralidharan, “On the Distribution and Revocation of Cryptographic Keys in Sensor Networks,” IEEE Trans. Dependable and Secure Computing, vol. 2 , no. 3, pp. 233-247, July 2005.
P. Yi, Z. Dai, Y. Zhong, and S. Zhang, “Resisting Flooding Attacks in Ad Hoc Networks,” Proc. Int’l Conf. Information Technology: Coding and Computing, vol. 2, pp. 657-662, Apr.2005.
B. Kannhavong, H. Nakayama, A. Jamalipour, Y. Nemoto, and N. Kato, “A Survey of Routing Attacks in MANET,” IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 85-91, Oct. 2007.
H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto, and N. Kato, “A Dynamic Anomaly Detection Scheme for Aodv-Based Mobile Ad Hoc Networks,” IEEE Trans. Vehicular Technology, vol. 58, no. 5, pp. 2471-2481, June 2009.
J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil Attack in Sensor Network: Analysis & Defenses,” Proc. Third Int’l Symp. Information Processing in Sensor Networks, pp. 259-268, 2004.
S. Micali, “Efficient Certificate Revocation,” Massachusetts Inst. of Technology, Cambridge, MA, 1996.
C. Gentry, “Certificate-Based Encryption and the Certificate Revocation Problem,” EUROCRYPT: Proc. 22nd Int’l Conf. Theory and Applications of Cryptographic Techniques, pp. 272293, 2003.
C. Chiasserini and R. Rao, “Pulsed battery discharge in communication devices,” in Proc. 5th Int. Conf. Mobile Computer, 1999, pp. 88–95.
K.Akkayaand M.Younis,“A survey of routing protocols in wireless sensor networks,” Elsevier Ad Hoc Netw. J., vol. 3, no. 3, pp. 325–349, 2005.
J. Newsome and D. Song, “GEM: Graph EMbedding for Routing and Data-Centric Storage in Sensor Networks without Geographic Information,” Proc. Int’l Conf. Embedded Networked Sensor Systems (SenSys), pp. 76-88, 2003.
W. Jia, T. Wang, G. Wang, and M. Guo, “Hole Avoiding in Advance Routing in Wireless Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), 2007.
H. Frey and I. Stojmenovic, “On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Net-works,” Proc. MobiCom, pp. 390-401, 2006.
Z. Zhong and T. He, “Achieving Range-Free Localization beyond Connectivity,” Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys), 2009.
T. He, C. Huang, B.M. Blum, J.A. Stankovic, and T. Abdelzaher, “Range-Free Localization Schemes for Large Scale Sensor Net-works,” Proc. MobiCom, pp. 81-95, 2003.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.