Citation: | HU Yiqing, XIONG Yan, LU Qiwei, et al., “A Secure Adaptive Routing Strategy Using Immune Mechanism in MANET,” Chinese Journal of Electronics, vol. 22, no. 4, pp. 784-788, 2013, |
S. Giordano, “Mobile ad hoc networks”, Handbook of WirelessN etworks and Mobile computing, pp.325-346, 2002.
|
N. Asokan, V. Niemi and K.Nyberg, “Man-in-the-middle int unelled authentication protocols”, Security Protocols, Springer,p p.28-41, 2005.
|
Y.C. Hu, A. Perrig and D.B. Johnson, “Packet leashes: A defensea gainst wormhole attacks in wireless networks”, Twenty-S econd Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003, Vol.3, pp.1976-1986, 2003.
|
A.D. Wood and J.A. Stankovie, “Denial of service in sensorn etworks”, Computer, Vol.35, No.10, pp.54-62, 2002.
|
K.M. Kimery and M. McCord, “Third-party assurances: Ther oad to trust in online retailing”, Proceedings of the 35th AnnualH awaii International Conference on System Sciences, IEEE,p p.10-15, 2002.
|
P.Devanbu, M. Gertz, C. Martec third-party data publication”,D ata and Application Security, Vol.73, pp.101-112, 2002.
|
M. Blaze, J. Feigenbaum and J. Lacy, “Decentralized trust management”,1 996 IEEE Symposium on Security and Privacy,I EEE, pp.164-173, 1996.
|
D. Wallner, E. Harde and R. Agee, “Key management for multicast:I ssues and architectures”, Tech. Rep., RF C2627, 1999.
|
M. Waldvogel, G. Caronni, D. Sun, N. Weiler and B. Plattner,“The versakey framework: Versatile group key management”,I EEE Journal on Selected Areas in Communications, Vol.17,N o.9, pp.1614-1631, 1999.
|
S. Rafaeli and D. Hutchison, “A survey of key managementf or secure group communication”, ACM Computing Surveys( CSUR), Vol.35, No.3, pp.309-329, 2003.
|
V. Manfredi, M. Crovella and J. Kurose, “Understanding statefulv s stateless communication strategies for ad hoc networks”, Proceedings of the 17th Annual International Conference onM obile Computing and Networking, ACM, pp.313-324, 2011.
|
C.E. Perkins and E.M. Royer, “Ad-hoc on-demand distancev ector routing”, Second IEEE Workshop on Mobile ComputingS ystems and Applications (WMCSA'99), pp.90-100, 1990.
|
S. Jain, K, Fall and R. Patra, “Routing in a delay tolerantn etwork”, SIGCOMM Comput. Commun. Rev., Vol.34, No.4,p p.145-158, 2004.
|
C.Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn,J . Rowe and K. Levitt, “A specification-based intrusion detections ystem for aodv”, Proceedings of the 1st ACM Workshopo n Security of ad hoc and Sensor Networks, ACM, New York,N Y, USA, pp.125-134, 2003.
|
W. Huang, Y. Xiong and D. Chen, “Daaodv: A secure ad hocr outing protocol based on direct anonymous attestation”, International Conference on Computational Science and Engineering, Vancourer, BC, Canada, Vol.2, pp.809-816, IEEE, 2009.
|
R. Perez, R. Sailer and L. Van Doorn, “Vtpm: Virtualizingt he trusted platform module”, Conference on USENIX Security Symposium, Vanouver, B.C. Canada, pp.305-320, 2006.
|
A. Katem G. Zaverucha and U. Hengartner, “Anonymity ands ecurity in delay tolerant network”, Third International Conferenceo n Security and Privacy in Communications Networks and the Workshops, Nice, France, pp.504-513, 2007.
|
J.Y. Le Boudec and S. Sarafijanović, “An artificial immune systema pproach to misbehaior detection in mobile ad hoc networks”,B iologically Inspired Approaches to Advanced InformationT echnology, Vol.3141, pp.396-411, 2004.
|
S. Sarafijanovic and J.Y. Le Boudec, “An artificial immune systema pproach with secondary response for misbehavior detection in mobile ad hoc networks”, IEEE Transacrions on NeuralN etworks, Vol.16, No.5, pp.1076-1087, 2005.
|
Y. Gu, A. McCallum and D. Towsley, “Detecting anomalies inn etwork traffic using maximum entropy estimation”, Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement,U SENIX Association, pp.32-36, 2005.
|
N. Mazhar and M. Farooq, “A sense of danger: Dendritic cellsi nspired artificial immune system for manet security”, Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation, ACM, pp.63-70, 2008.
|
J. Kim and P.J. Bentley, “Towards an artificial immune systemf or network intrusion detection: An investigation of clonal selectionw ith a negative selection operator”, Proceedings of the 2001 Congress on Evolutionary Computation, IEEE, Vol.2, pp.1244-1252, 2001.
|
S. McCanne and S. Floyd, “Ns network simulator”, 1995.
|