Information Technology Reference
In-Depth Information
28. Feeney L, Nilsson M (2001) Investigating the energy consumption of a wireless network
interface in an ad hoc networking environment. Proceedings of the Twentieth Annual Joint
Conference of the IEEE Computer and Communications Societies (INFOCOM 2001), vol 3.
Anchorage, AK, pp 1548-1557
29. Shih E, Cho S, Ickes N, Min R, Sinha A, Wang A, Chandrakasan A (2001) Physical layer
driven protocol and algorithm design for energy-efficient wireless sensor networks. In:
Proceedings of the seventh annual international conference on mobile computing and net-
working (MOBICOM 2001). ACM, Rome, Italy, pp 272-287
30. Abdallah A, Fevens T, Opatrny J (2006) Randomized 3-D position based routing algorithm
for ad-hoc networks. Proceedings of the 3rd annual international conference on mobile and
ubiquitous systems: networks and services (MOBIQUITOUS), San Jose, CA, pp 1-8
31. Fonseca E, Festag A (2006) A survey of existing approaches for secure ad hoc routing and
their applicability to VANETS. NEC Technical Report NLE-PR-2006-19, NEC Network
Laboratories. http://www.network-on-wheels.de
32. Krawczyk H, Bellare M, Canetti R (1997) HMAC: keyedhashing for message authentication.
Internet Engineering Task Force, Request for Comment RFC 2104. http://www.ietf.org/rfc/
rfc2104.txt
33. Perrig A, Canetti R, Song D, Tygar D, Briscoe B (2004) TESLA: multicast source authentica-
tion transform introduction. Internet Engineering Task Force, Internet Draft of Multicast
Security Working Group. http://tools.ietf.org/html/draft-ietf-msec-tesla-intro-04.txt
34. Hu Y, Perrig A, Johnson D (2003) Packet leashes: a defense against wormhole attacks in
wire-less network. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer
and Communications Societies (INFOCOM 2003) 3(1):1976-1986, April 1 - 3, 2003 San
Francisco, CA, USA
35. Li J, Jannotti J, De Couto D, Karger D, Morris R (2000) A scalable location service for geo-
graphic ad hoc routing. Proceedings of the 6th Annual ACM/IEEE International Conference
on Mobile Computing and Networking (MOBICOM 2000), Boston, MA, pp 120-130
36. Capkun S, Hubaux J (2005) Secure positioning of wireless devices with application to sensor
networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and
Communications Societies (INFOCOM 2005), 3(1), Miami, Fl, pp 1917-1928
Search WWH ::




Custom Search