Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 5
Page No. 978 - 988

Secure and Energy Efficient Dynamic Clustering Scheme in Mobile Adhoc Networks

Authors : A.D. Khamala Khannen and Suthanthira Vanitha

References

Blundo, C., P. D'Arco, A. de Santis and M. Listo, 2004. Design of self-healing key distribution schemes. Des. Codes Cryptogr., 32: 15-44.
CrossRef  |  Direct Link  |  

Boneh, D. and M.K. Franklin, 2001. Identity-based Encryption from the Weil Pairing. In: Advances in Cryptology, Kilian, J. (Ed.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-42456-7, pp: 213-229.

Broch, J., D.B. Johnson and D.A. Maltz, 1999. The dynamic source routing protocol for mobile ad hoc networks. Internet-Draft, draft-ietf-manet-dsr-03.txt, October 1999.

Camp, T., J. Boleng, B. Williams, L. Wilcox and W. Navidi, 2002. Performance Comparison of two location based routing protocols for ad hoc networks. Proceedings of the Infocom 21st Annual Joint Conference of the IEEE Computer and Communications Societies, 2002, IEEE Xplore, pp: 1678-1687.

Douceur, J.R., 2002. The Sybil attack. Proceedings of the 1st International Workshop on Peer-to-Peer Systems, March 7-8, 2002, Cambridge, MA., USA., pp: 251-260.

Haas, Z.J. and M.R. Pearlman, 1998. The performance of query control schemes for the zone routing protocol. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication, August 31-September 4, 1998, Vancouver, Canada, pp: 167-177.

Khalili, A., J. Katz and W.A. Arbaugh, 2003. Toward secure key distribution in truly ad-hoc networks. Proceedings of the Symposium on Applications and the Internet Workshops, January 27-31, 2003, Orlando, FL., USA., pp: 342-346.

Ko, Y.B. and N.H. Vaidya, 1998. Location-Aided Routing (LAR) in mobile ad hoc networks. Proceedings of the 4th ACM/IEEE International Conference on Mobile Computing and Networking, October 25-30, 1998, Dallas, Texas, USA., pp: 66-75.

Liao, H.C. and C.J. Lin, 2007. A WiMAX-based connectionless approach for high mobility MANET. Proceedings of the 9th International Conference on Advanced Communication Technology, February 12-14, 2007, Phoenix Park, Korea, pp: 479-483.

Liao, H.C. and C.J. Lin, 2008. A position-based connectionless routing algorithm for MANET and WiMAX under high mobility and various node densities. Inform. Technol. J., 7: 458-465.
CrossRef  |  Direct Link  |  

Liu, D.G., P. Ning and K. Sun, 2003. Efficient self-healing group key distribution with revocation capability. Proceedings of the 10th ACM Conference on Computer and Communications Security, October 27-31, 2003, ACM Press, Washington, DC. USA., pp: 231-240.

Luo, H., J. Kong, Z. Petros, S. Lu and L. Zhang, 2004. URSA: Ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Trans. Networking, 12: 1049-1063.
CrossRef  |  Direct Link  |  

McCullagh, N. and P.S. Barreto, 2005. A new two-party identity-based authenticated key agreement. Proceedings of the Cryptographers' Track at the RSA Conference, February 14-18, 2005, San Francisco, CA., USA., pp: 262-274.

Narasimha, M., G. Tsudik and J.H. Yi, 2003. On the utility of distributed cryptography in P2P and MANETs: The case of membership control. Proceedings of 11th International Conference on Network Protocols, November 4-7, 2003, IEEE Computer Society Washington, DC, USA., pp: 336-345.

Perkins, C.E. and P. Bhagwat, 1994. Highly dynamic Destination Sequenced Distance-Vector routing (DSDV) for mobile computers. ACM SIGCOMM Comput. Commun. Rev., 24: 234-244.
CrossRef  |  Direct Link  |  

Shamir, A., 1985. Identity-Based Cryptosystems and Signature Schemes. In: Advances in Cryptology, Blakley, G. and D. Chaum (Eds.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-15658-1, pp: 47-53.

Shin, S. and T. Kwon, 2007. Efficient and secure key agreement for merging clusters in ad-hoc networking environments. IEICE Trans. Commun., E90-B: 1575-1583.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved