References
[1] C.S. Murthy, B.S. Manoj, “Ad Hoc Wireless Networks :Architectures and Protocols”, Prentice Hall Publishers, May 2004, ISBN 013147023X.
[2] C.K. Toh, “Ad Hoc Mobile Wireless Networks: Protocols and Systems”, Prentice Hall publishers, December 2001, ISBN 0130078174.
[3] C. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”. In Proc. of the ACM SIGCOMM, October 1994.
[4] S. Murthy, J.J. Garcia-Luna-Aveces, "A Routing Protocol for Packet Radio Networks," Proc. ACM International Conference on Mobile Computing and Networking, pp. 86-95, November, 1995.
[5] C.C. Chiang, “Routing in Clustered Multihop, Mobile Wireless Networks withFading Channel,” Proc. IEEE SICON ’97, Apr. 1997, pp. 197–211.
[6] S R. Das, C E. Perkins, E M. Royer and M K. Marina ."Performance Comparison of Two On-demand Routing Protocols for Ad hoc Networks."IEEE Personal Communications Magazine special issue on Ad hoc Networking, p. 16-28, February 2001.
[7] Z.J Haas, “ A new routing protocol for the reconfigurable wireless network”. In Proceedings of the 1997 IEEE 6th International Conference on Universal Personal Communications, ICUPC `97, San Diego, CA, pp. 562 – 566,October 1997;
[8] K.Sanzgiri, B. Dahill, B. N. Levine, C. Shields and E M. B royer."A Secure Routing Protocol for Ad Hoc Networks" (ARAN) In International Conference on Network Protocols (ICNP), Paris, France, November 2002.
[9] S Basagni, M Conti, S Giordano, I Stojmenovic, “Mobile Ad Hoc Networking”, ISBN: 0-471-37313-3, Wiley-IEEE Press: Chapter 12: Ad hoc networks SecurityPietroMichiardi, RefikMolva.
[10] Y Hu, D B. Johnson, A Perrig. "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks", Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA `02), pp: 3-13, Jun 2002.
[11] Y Hu, A Perrig, D B. Johnson. "Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks"MobiCom 2002, Atlanta, Georgia, USA, September 23-28, 2002.
[12] A. Perrig, R. Canetti, D. Tygar, and D. Song, "The TESLA Broadcast Authentication Protocol," Cryptobytes,, Volume 5, No. 2 (RSA Laboratories, Summer/Fall 2002), pp. 2-13.
[13] P. Papadimitratos and Z. Haas."Secure routing for mobile ad hoc networks" (SRP) SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, pp. 27--31, January 2002.
[14] S. Capkun, L. Buttyan and J-P Hubaux. "Self-Organized Public-Key Management for Mobile Ad Hoc Networks ", IEEE Transactions on Mobile Computing, Vol. 2, No. 1, pp. 52-64,Jan-Mar 2003.
[15] W Wang, Y Zhu, B Li. "Self-Managed Heterogeneous Certification in Mobile Ad Hoc Networks ", in the Proceedings of IEEE Vehicular Technology Conference (VTC 2003), Orlando, Florida, 10/6-9, 2003.
[16] J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. "Providing robust and Ubiquitous Security support for Mobile Ad Hoc Networks ", Proceedings of the 9th International conference on Network Protocols (ICNP), Riverside, California, USA, November 11-14, 2001.
[17] E C. H. Ngai and M R. Lyu. "Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks", 24th International Conference on Distributed Computing Systems Workshops - W4: MDC (ICDCSW`04), Hachioji, Tokyo, Japan, 3/23-24, 2004.
[18] L. Zhou and Z. Haas. “Securing Ad Hoc Networks”, IEEE Network magazine, special issue on networking security, Vol. 13, No. 6, November/December 1999.
[19] M C Morogan “Certificate Management in Ad Hoc Networks”, Symposium on Applications and the Internet Workshops (SAINT`03 Workshops), pp. 337,January 27 - 31, 2003.
[20] T. Camp, J. Boleng, and V. Davies. “A Survey of Mobility Models for Ad Hoc Network Research",in Wireless Communication & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, vol. 2, no. 5, 2002.
[21] B Liang, Z. J. Haas, “Predictive distance-based mobility management for multidimensional PCS networks”, IEEE/ACM Transactions on Networking (TON), Volume 11 , Issue 5 , Pages: 718 – 732, October 2003
[22] J. Yoon, M. Liu, and B. Noble."Random waypoint considered harmful," in Proc. of IEEE INFOCOM `03, vol. 2, pp. 1312—1321, March 2003.
[23] M G Zapata, “SecureAdhoc On-Demand Distance Vector Routing”, ACM Mobile Computing and Communications Review (MC2R), pp:106--107, July 2002.
[24] R. Kumari, P. Nand, “Performance Analysis of existing Routing Protocols” International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), ISSN-2320-7639, Vol. 5 No. 5, October-2017.