REFERENCES
- W Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed, Prentice-Hall 1999, ISBN 0138690170.
- L Zhou & ZJ Hass, Securing Ad hoc Networks, Journal of IEEE Network Magazine, vol 3, no 6, Nov/Dec 1999.
- Yongguang Zhang & Wenke Lee, Intrusion detection in wireless ad hoc networks, Proceedings of the 6th international conference in mobile computing and networking (MOBICOMM'00), pp 275–283, June 2000.
- Sonali Bhargava & Dharma P Agarwal, Security enhancement in AODV protocol for wireless Ad Hoc networks, IEEE 2001.
- CE Perkins & P Bhagwat, Highly dynamic Destination-Sequenced Distance Vector (DSDV) Routing for Mobile Computers, SIGCOMM, pp 46–55, August 1994.
- Tomasz Imielinski & Hank Korth, Mobile Computing, Kulwer Academic publication, 1996, pp 153–181.
- J Broch, DB Johnson & DA Maitz, The Dynamic Source Routing Protocol for Mobile Ad hoc Networks, Internet draft, draft-ietf-manet-dsr-03.txt, April 2000.
- CE Perkins, EM Royer & Samir R Das, Ad hoc On demand Distance Vector Routing, draft-ietf-manet-aodv-04.txt, 22 October 1999.
- CE Perkins & E Royer, Ad hoc on demand Distance Vector Routing, in Proceedings of the 2nd IEEE workshop on Mobile Computing systems and applications, pp 90–100, February 1999.
- S Radha & S Shanmugavel, Implementation of Node Transition Probability based routing algorithm for MANET and performance analysis using different mobility models, Journal of Communication Network, vol 5, pp 201–214, Sep 2003.
- Sergio Marti, TJ Giuli, Kevin Lai, & Mary Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of 6th International Conference on Mobile Computing and Networking, MOBICOM'00, pp 255–265, August 2000.