Home > Articles > Security > Network Security

  • Print
  • + Share This
This chapter is from the book

BIBLIOGRAPHY

[1] J. Postel,

"Transmission Control Protocol,"
IETF RFC 793, September 1981.

[2] V. Jacobson,

"Congestion Avoidance and Control,"
Proceedings of ACM SIG-COMM 1988, pp. 314-329, August 1988.

[3] W. R. Stevens,

"TCP Slow Start, Congestion Avoidance, Fast Retransmission, and Fast Recovery Algorithms,"
IETF RFC 2001, January 1997.

[4] J. C. Hoe,

"Improving the Start-Up Behavior of a Congestion Control Scheme for TCP,"
Proceedings of the ACM SIGCOMM 1996, pp. 270-280, August 1996.

[5] M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow,

"TCP Selective Acknowledgment Options,"
IETF RFC 2018, October 1996.

[6] S. Floyd, J. Mahdavi, M. Mathis, and M. Podolsky,

"An Extension to the Selective Acknowledgment (SACK) Option for TCP,"
IETF RFC 2883, July 2000.

[7] M. Gerla, K. Tang, and R. Bagrodia,

"TCP Performance in Wireless Multi-Hop Networks,"
Proceedings of IEEE WMCSA 1999, pp. 41-50, February 1999.

[8] G. Holland and N. Vaidya,

"Analysis of TCP Performance over Mobile Ad Hoc Networks,"
Proceedings of ACM MOBICOM 1999, pp. 219-230, August 1999.

[9] K. Chandran, S. Raghunathan, S. Venkatesan, and R. Prakash,

"A Feedback-Based Scheme for Improving TCP Performance in Ad Hoc Wireless Networks,"
IEEE Personal Communications Magazine, vol. 8, no. 1, pp. 34-39, February 2001.

[10] D. Kim, C. K. Toh, and Y. Choi,

"TCP-BuS: Improving TCP Performance in Wireless Ad Hoc Networks,"
Journal of Communications and Networks, vol. 3, no. 2, pp. 1-12, June 2001.

[11] C. K. Toh,

"Associativity-Based Routing for Ad Hoc Mobile Networks,"
Wireless Personal Communications, vol. 4, no. 2, pp. 1-36, March 1997.

[12] J. Liu and S. Singh,

"ATCP: TCP for Mobile Ad Hoc Networks,"
IEEE Journal on Selected Areas in Communications, vol. 19, no. 7, pp. 1300-1315, July 2001.

[13] S. Kopparty, S. V. Krishnamurthy, M. Faloutsos, and S. K. Tripathi,

"Split TCP for Mobile Ad Hoc Networks,"
Proceedings of IEEE GLOBECOM 2002, vol. 1, pp. 138-142, November 2002.

[14] J. Liu and S. Singh,

"ATP: Application Controlled Transport Protocol for Mobile Ad Hoc Networks,"
Proceedings of IEEE WCMC 1999, vol. 3, pp. 1318-1322, September 1999.

[15] K. Sundaresan, V. Anantharaman, H. Y. Hsieh, and R. Sivakumar,

"ATP: A Reliable Transport Protocol for Ad Hoc Networks,"
Proceedings of ACM MOBIHOC 2003, pp. 64-75, June 2003.

[16] Y. Hu, A. Perrig, and D. B. Johnson,

"Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks,"
Proceedings of IEEE INFOCOM 2003, vol. 3, pp. 1976-1986, April 2003.

[17] B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens,

"An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,"
Proceedings of the ACM Workshop on Wireless Security 2002, pp. 21-30, September 2002.

[18] C. E. Perkins and E. M. Royer,

"Ad Hoc On-Demand Distance Vector Routing,"
Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, pp. 90-100, February 1999.

[19] Y. Hu, A. Perrig, and D. B. Johnson,

"Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,"
Proceedings of the ACM Workshop on Wireless Security 2003, pp. 30-40, September 2003.

[20] L. Zhou and Z. J. Haas,

"Securing Ad Hoc Networks,"
IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, December 1999.

[21] A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.

[22] A. Khalili, W. A. Arbaugh,

"Security of Wireless Ad Hoc Networks,"
http://www.cs.umd.edu/~aram/wireless/survey.pdf.

[23] N. Asokan and P. Ginzboorg,

"Key-Agreement in Ad Hoc Networks,"
Computer Communications, vol. 23, no. 17, pp. 1627-1637, 2000.

[24] S. Capkun, L. Buttyan, and J. P. Hubaux,

"Self-Organized Public-Key Management for Mobile Ad Hoc Networks,"
IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52-64, January-March 2003.

[25] S. Yi, P. Naldurg, and R. Kravets,

"Security-Aware Ad Hoc Routing for Wireless Networks,"
Proceedings of ACM MOBIHOC 2001, pp. 299-302, October 2001.

[26] Y. Hu, D. B. Johnson, and A. Perrig,

"SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,"
Proceedings of IEEE WMCSA 2002, pp. 3-13, June 2002.

[27] C. E. Perkins and P. Bhagwat,

"Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,"
Proceedings of ACM SIG-COMM 1994, PP- 234-244, August 1994.

[28] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M.B. Royer,

"A Secure Routing Protocol for Ad Hoc Networks,"
Proceedings of IEEE ICNP 2002, pp. 78-87, November 2002.

[29] H. Deng, W. Li, and D. P. Agrawal,

"Routing Security in Wireless Ad Hoc Networks,"
IEEE Communications Magazine, vol. 40, no. 10, pp. 70-75, October 2002.

[30] P. Papadimitratos and Z. J. Haas,

"Secure Routing: Secure Data Transmission in Mobile Ad Hoc Networks,"
Proceedings of ACM Workshop on Wireless Security 2003, pp. 41-50, September 2003.

[31] A. Fasbender, D. Kesdogan, and O. Kubitz,

"Variable and Scalable Security: Protection of Location Information in Mobile IP,"
Proceedings of IEEE VTC 1996, vol. 2, pp. 963-967, May 1996.

[32] Y. Hu, A. Perrig, and D. B. Johnson,

"Ariadne: A Secure On-Demand Routing for Ad Hoc Networks,"
Proceedings of ACM MOBICOM 2002, pp. 12-23, September 2002.

  • + Share This
  • 🔖 Save To Your Account