1.A.Rahman
and S. Hailes, “A Distributed Trust Model”, New Security Para=
digms
Workshop 1997, ACM, 1997.
2.D.
Balfanz, D. Smetters, P. Stewart and H. Wong, “Talking to Strangers:
Authentication in Ad-hoc Wireless Networks”, NDSS, San Diego, 2002.
3.L.
Eschenauer, V.Gligor and J. Baras, “On Trust Establishment in Mobile
Ad-Hoc Networks”, Proc. 10th International Workshop <=
span
style=3D'position:absolute;top:27.5%;left:12.35%;width:80.52%;height:2.25=
%'>of Security Protocols, Springer Lecture Notes in
Computer Science (LNCS), Apr. 2002.
4.J.
Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu, “Adaptive secur=
ity
for multi-layer ad-hoc networks,” in Special Issue of Wireless Communications and Mobile Computing. Wil=
ey
Interscience Press, Aug. 2002.
5.T.
Hughes, J. Denny, P. Muckelbauer, J. Etzl, "Dynamic Trust Applied to=
Ad
Hoc Network Resources", Autonomous Agents & Multi-Agent Systems Conference, Melbourne, Austra=
lia,
2003.
6.J.
Kong, P. Zerfos, H. Luo, S. Lu and L. Zhang, “Providing Robust and
Ubiquitous Security Support for Mobile Ad-hoc Networks”, ICNP, Riverside, CA, 2001.
<=
/span>
7.L.
Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network
Magazine, vol. 13, no. 6, pp. 24–30, Nov.’99.
8.C.
Davis, "A localized trust management scheme for ad-hoc networks"=
;,
Proc. 3rd International Conference on Networking (ICN<=
span
style=3D'font-size:38%'>'04), Mar. 2004.
9.H.
Debar, M.Dacier, A. Wespi and S. Lampart, “An Experimentation Workb=
ench
for Intrusion Detection Systems”, Research Report, IBM<=
/span> Research Division, Zurich Research Laboratory,
Switzerland, 1982.
10.M.
Virendra, S. Upadhyaya, X. Wang, “ GSWLAN: A New Architecture Model=
for
a Generic and Secure Wireless LAN System”, 5th Annual IEEE&=
nbsp;
Information Assurance Workshop, West Point, NY, June 2004.
11.M.
Molloy, “Performance analysis using Stochastic Petri Nets”, I=
EEE
Trans. On Computers, vol. 39, no 9, pp. 913-917.
12.Y. Huang and W. Lee, “A Cooperative Intrusi=
on
Detection System for Ad Hoc Networks”, ACM CCS SASN Wor=
skhop,
Oct. 2003.
13.Y.
Huang, W. Fan, W. Lee, and P. Yu, “Cross-feature analysis for detec=
ting
ad-hoc routing anomalies”, 23rd International Conference on Distributed Computing Systems, Prov=
idence,
May 2003.
14.S.
Upadhyaya, R. Chinchani, K. Kwiat, "An Analytical Framework for Reas=
oning
about Intrusions", Symposium on Reliable Distributed Systems (SRDS’01), New Orleans,=
Oct.
2001
15.L.
Zhou, F. Schneider, R. van Renesse, “COCA: A secure distributed on-=
line
certification authority”, ACM Transactions on Computer Systems 20, Nov. 2002, pp. 329–368=
.
16.H.
Debar, M.Dacier, A. Wespi, S. Lampart, “An Experimentation Workbenc=
h for
Intrusion Detection Systems”, Research Report, IBM<=
/span> Research Division, Zurich Research Laboratory,
Switzerland, 1982.
17.S.
Zhu, S. Xu, S. Setia and S. Jajodia, “Establishing Pair-wise Keys f=
or
Secure Communication in Ad Hoc Networks”, 11th IEEE <=
span
style=3D'position:absolute;top:73.0%;left:12.35%;width:80.52%;height:2.25=
%'>International Conference on Network Protocols
(ICNP’03), Atlanta, Nov. 2003.
18.S.
Zhu, S. Xu, S. Setia, S. Jajodia and P. Ning, “An Interleaved Hop-b=
y-Hop
Authentication Scheme for Filtering of Injected False Data in Sensor Networks”, IEEE Sympos=
ium on
Security and Privacy, Oakland, May 2004
19.Y.
Ko , N. Vaidya, “Location-aided routing (LAR) in mobile ad hoc
networks”, Proc. 4th annual ACM/IEEE international conference on Mobile computing and networking, pp=
.66-75,
Dallas, Oct. 1998