[1]
M. Azer, S. EI-Kassas, and M. EI Soudani, Security in Ad Hoc Networks: From Vulnerability to Risk Maagement, in Third Interational Conference on Emerging Securit Information, Systems and Technologies, Greece, 2009 , pp.203-209.
DOI: 10.1109/securware.2009.38
Google Scholar
[2]
D. Wang, M. Hu, and H. Zhi, A Survey of Secure Routing in Ad Hoc Networks, in The Ninth International Conference on WebAge Information Management, 2008, pp.482-486.
DOI: 10.1109/waim.2008.79
Google Scholar
[3]
V. Karpijoki, Security in Ad Hoc Networks, in Proceedings of the Helsinki Universit of Technolog, Seminars on Netork Securit, (2000).
Google Scholar
[4]
H. Yang, H.Y. Luo, F. Ye, S.W. Lu, and L. Zhang . Security in Mobile Ad Hoc Networks: Challenges and Solutions, IEEE Wireless Communications Magaine. Vol. II Issue 2, 2004, pp.37-47.
DOI: 10.1109/mwc.2004.1269716
Google Scholar
[5]
M. Zapata, and N. Asokan, Securing Ad Hoc routing Protocols, Proceedings of ACM Workshop on Wireless Securit, USA, 2002, pp. I-IO.
DOI: 10.1145/570681.570682
Google Scholar
[6]
P. Papadimitratos, and Z. Haas, Secure Routing for Mobile Ad Hoc Networks, Proceedings of the SCS Communication Netorks and Distributed Systems Modelling and Simulation Corerence, (2002).
Google Scholar
[7]
Y. Hu, and A. Perrig, A Survey of Secure Wireless Ad Hoc Routing, IE Securit and Privac Magazine, May/June 2004, pp.28-39.
Google Scholar
[8]
M. Azer, S. EI-Kassas, M. EI Soudani, and A. Hassan, A Survey on Trust ad Reputation Schemes in Ad Hoc Networks, Te Third International Conference on Availabilit, Reliabilit and Securit, Poland, 2006, pp.881-886.
DOI: 10.1109/ares.2008.180
Google Scholar