Federal Information Processing Standard, pp.180-182, 2002. ,
An On-Demand Secure Routing Protocol Resilient to Byzantine Failures, ACM Workshop on Wireless Security (WiSe), 2002. ,
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp.403-410, 2002. ,
DOI : 10.1109/EMPDP.2002.994321
An attacker model for MANET routing security, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.87-93, 2009. ,
DOI : 10.1145/1514274.1514288
The Design of Rijndael, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Recommendation for Block Cipher Modes of Operation -Methods and Techniques, NIST Special Publication, pp.800-838, 2001. ,
Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality, NIST Special Publication, pp.800-838, 2004. ,
DOI : 10.6028/NIST.SP.800-38c
TEP 123: Collection Tree Protocol, 2006. ,
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, Ad Hoc Networks, pp.175-192, 2003. ,
DOI : 10.1016/S1570-8705(03)00019-2
Ariadne:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, pp.12-23, 2002. ,
DOI : 10.1145/570645.570648
Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, 1996. ,
DOI : 10.1007/978-0-585-29603-6_5
Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks, Proceedings of the First USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI), pp.15-28, 2004. ,
Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.255-265, 2000. ,
DOI : 10.1145/345910.345955
Trust Based Routing Decisions in Mobile Ad-hoc Networks, Proceedings of the Workshop on Secure Knowledge Management, 2006. ,
Secure Routing for Mobile Ad Hoc Networks, Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2002. ,
Ad hoc On-Demand Distance Vector (AODV) Routing, 2003. ,
DOI : 10.17487/rfc3561
Highly Dynamic Destination-Sequenced Distance- Vector Routing (DSDV) for Mobile Computers, ACM SIGCOMM'94 Conference on Communications Architectures, Protocols and Applications, pp.234-244, 1994. ,
Ad-Hoc On-Demand Distance Vector Routing, MIL- COM '97 Panel on Ad Hoc Networks, 1997. ,
The TESLA Broadcast Authentication Protocol, Cryptobytes, pp.2-13, 2002. ,
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.189-199, 2001. ,
DOI : 10.1145/381677.381696
The MD5 Message-Digest Algorithm, 1992. ,
DOI : 10.17487/rfc1321
Applied cryptography: protocols, algorithms, and source code in C, 1996. ,
Securing ad hoc routing protocols, Proceedings of the ACM workshop on Wireless security , WiSE '02, pp.1-10, 2002. ,
DOI : 10.1145/570681.570682