15
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Enhanced Intrusion Detection Algorithm for NTP based Routing protocol for Wireless Ad Hoc Networks

&
Pages 353-359 | Published online: 26 Mar 2015

REFERENCES

  • W Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed, Prentice-Hall 1999, ISBN 0138690170.
  • L Zhou & ZJ Hass, Securing Ad hoc Networks, Journal of IEEE Network Magazine, vol 3, no 6, Nov/Dec 1999.
  • Yongguang Zhang & Wenke Lee, Intrusion detection in wireless ad hoc networks, Proceedings of the 6th international conference in mobile computing and networking (MOBICOMM'00), pp 275–283, June 2000.
  • Sonali Bhargava & Dharma P Agarwal, Security enhancement in AODV protocol for wireless Ad Hoc networks, IEEE 2001.
  • CE Perkins & P Bhagwat, Highly dynamic Destination-Sequenced Distance Vector (DSDV) Routing for Mobile Computers, SIGCOMM, pp 46–55, August 1994.
  • Tomasz Imielinski & Hank Korth, Mobile Computing, Kulwer Academic publication, 1996, pp 153–181.
  • J Broch, DB Johnson & DA Maitz, The Dynamic Source Routing Protocol for Mobile Ad hoc Networks, Internet draft, draft-ietf-manet-dsr-03.txt, April 2000.
  • CE Perkins, EM Royer & Samir R Das, Ad hoc On demand Distance Vector Routing, draft-ietf-manet-aodv-04.txt, 22 October 1999.
  • CE Perkins & E Royer, Ad hoc on demand Distance Vector Routing, in Proceedings of the 2nd IEEE workshop on Mobile Computing systems and applications, pp 90–100, February 1999.
  • S Radha & S Shanmugavel, Implementation of Node Transition Probability based routing algorithm for MANET and performance analysis using different mobility models, Journal of Communication Network, vol 5, pp 201–214, Sep 2003.
  • Sergio Marti, TJ Giuli, Kevin Lai, & Mary Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of 6th International Conference on Mobile Computing and Networking, MOBICOM'00, pp 255–265, August 2000.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.