@incollection{, 3B2D3B9B084F1BFE5C1F49950106187D , author={{Mrs. Prasuna VG} and {Basaveswara Institute Of Information Technology, Hyderabad,India}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}11204351 } @incollection{b0, , title={{Ad hoc On-Demand Distance Vector Routing}} , author={{ Perkins }} , booktitle={{Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications}} the IEEE Workshop on Mobile Computing Systems and Applications , year={February 1999} } @incollection{b1, , title={{Denial of Service in Sensor Networks}} , journal={{IEEE Computer Magazine}} , year={October 2002} } @book{b2, , title={{Network Layer Protocols with Byzantine Robustness}} , author={{ Perlman }} MIT LCS TR-429 , year={October 1998} , note={Ph.D. thesis} } @incollection{b3, , title={{Secure Routing for Mobile Ad Hoc Networks}} , author={{ Papadimitrators }} , booktitle={{SCS Communication Networks and Distributed Systems Modeling and Simulation Conference}} , year={January 2002} } @incollection{b4, , title={{The Keyed-Hash Message Authentication Code (HMAC)}} , journal={{No. FIPS}} 198 , year={2002} National Institute for Standards and Technology (NIST } @book{b5, , title={{A Secure Routing Protocol for Ad Hoc Networks}} , author={{ Dahill }} UM-CS-2001-037 , year={August, 2001} University of Massachusetts , note={Technical Report} } @incollection{b6, , title={{Secure Ad hoc On-Demand Distance Vector Routing}} , author={{ Zapata }} , booktitle={{ACM Mobile Computing and Communications Review (MC2R)}} , year={July 2002} } @incollection{b7, , title={{A method for obtaining Digital Signatures and Public Key Cryptosystems}} , author={{ Rivest }} , booktitle={{Computer Security Applications Conference}} , year={February 1978. 1997} 11 , note={An Efficient Message Authentication Scheme for Link State Routing} } @incollection{b8, , title={{Reducing the Cost of Security in Link State Routing}} , author={{ Hauser }} , booktitle={{Symposium on Network and Distributed Systems Security}} , year={February 1997} } @incollection{b9, , title={{Password Authentication with Insecure Communication}} , author={{ Hu }} , booktitle={{Ariadne: A secure On-Demand Routing 9}} Lamport , year={November 1981} } @book{b10, , title={{Constructing Digital Signature Based on a Conventional Encryption Function}} , author={{ Lamport }} , year={1979. September 2002} , address={MobiCom} , note={Protocol for Ad hoc Networks} } @incollection{b11, , title={{SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks}} , author={{ YCHu } and { DBJohnson } and { APerrig }} , journal={{Ad Hoc Networks Journal}} 1 , year={2003} } @incollection{b12, , title={{Efficient and Secure Source Authentication for Multicast}} , author={{ Perrig }} , booktitle={{Network and Distributed System Security Symposium}} , year={February 2001} } @incollection{b13, , title={{Awerbuch: "An On-Demand Secure Routing Protocol Resilient to Byzantine Failures}} , author={{ Marti }} , booktitle={{ACM International Conference on Mobile Computing and Networking}} Herzberg , year={August 2000. 17. September 2002. 18. 2000} 30 , note={SIAM J. Comput.} } @incollection{b14, , title={{A Routing Protocol with Byzantine Robustness}} , author={{ Avramopoulos }} , booktitle={{The 2003 IEEE Sarnoff Symposium}} , year={March 2003} } @incollection{b15, , title={{Dynamic Source Routing in Ad Hoc Wireless Networks}} , author={{ Johnson }} , journal={{Mobile Computing}} , year={1996} , publisher={Kluwer Academic Publishers} } @incollection{b16, , title={{Message Authentication in Computationally Constrained Environments}} , author={{ BenjaminArazi }} , journal={{IEEE TRANSACTIONS ON MOBILE COMPUTING}} 8 7 , year={JULY 2009} } @incollection{b17, , title={{A reliable, efficient topology broadcast protocol for dynamic networks}} , author={{ BBellur } and { RGOgier }} , booktitle={{Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 99)}} the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 99) , year={March 1999} } @incollection{b18, , title={{An adaptive distance vector routing algorithm for mobile, ad hoc networks}} , author={{ RVBoppana } and { SKonduru }} , booktitle={{Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies}} the Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies , year={INFOCOM 2001. 2001} } @book{b19, , title={{Optimized Link State Routing Protocol, Internet-draft, draft-ietfmanet-olsr-05.txt}} , author={{ TClausen } and { PJacquet } and { ALaouiti } and { PMinet } and { PMuhlethaler } and { AQayyum } and { LViennot }} , year={October 2001} , note={Work in Progress} } @book{b20, , author={{ JJGarcia-Luna-Aceves } and { CLFullmer } and { EMadruga } and { DBeyer } and { TFrivold }} , title={{Wireless Internet Gateways (WINGS)}} , note={Proceedings of IEEE MILCOM 97} } @incollection{b21, , title={{The DARPA Packet Radio network protocols}} , author={{ JJubin } and { JDTornow }} , journal={{Proceedings of the IEEE}} 75 1 , year={1987} } @incollection{b22, , title={{An efficient routing protocol for wireless networks}} , author={{ SMurthy } and { JJGarcia-Luna-Aceves }} , journal={{Mobile Networks and Applications}} 1 2 , year={1996} } @incollection{b23, , title={{Highly Dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers}} , author={{ CEPerkins } and { PBhagwat }} , booktitle={{Proceedings of the SIGCOMM 94 Conference on Communications Architectures, Protocols and Applications}} the SIGCOMM 94 Conference on Communications Architectures, Protocols and Applications , year={August 1994} } @incollection{b24, , title={{Dynamic source routing in ad hoc wireless networks}} , author={{ DBJohnson } and { DAMaltz }} , booktitle={{Mobile Computing}} , editor={ TImielinski HKorth } Dordrecht , publisher={Kluwer Academic Publishers} , year={1996} } @incollection{b25, , title={{A highly adaptive distributed routing algorithm for mobile wireless networks}} , author={{ VDPark } and { MSCorson }} , booktitle={{Proceedings of INFOCOM 97}} INFOCOM 97 , year={April 1997} } @incollection{b26, , title={{A routing protocol for the reconfigurable wireless network}} , author={{ ZJHaas }} , booktitle={{IEEE 6th International Conference on Universal Personal Communications Record: Bridging the Way to the 21st Century (ICUPC 97)}} , year={1997. October 1997} 2 } @book{b27, , title={{Routing Information Protocol}} , author={{ CHedrick }} RFC 1058 , year={November 1988} } @book{b28, , title={{RIP version 2 protocol applicability statement, RFC 1722}} , author={{ GSMalkin }} , year={November 1994} } @book{b29, , title={{RIP version 2, RFC 2453}} , author={{ GSMalkin }} , year={November 1998} } @incollection{b30, , title={{The ALOHA system--another alternative for computer communications}} , author={{ NAbramson }} , booktitle={{Proceedings of the Fall 1970 AFIPS Computer Conference}} the Fall 1970 AFIPS Computer Conference , year={November 1970} } @book{b31, , title={{RIP-2 MD5 Authentication, RFC 2082}} , author={{ FBaker } and { RAtkinson }} , year={January 1997} } @book{b32, , author={{ SBasagni } and { KHerrin } and { ERosti } and { DBruschi } and { SecurePebblenets }} , title={{ACM International Symposium on Mobile Ad Hoc Networking and Computing}} Long Beach, CA , year={MobiHoc 2001. October 2001} } @incollection{b33, , title={{A performance comparison of multi-hop wireless ad hoc network routing protocols}} , author={{ JBroch } and { DAMaltz } and { DBJohnson } and { Y.-CHu } and { JGJetcheva }} , booktitle={{Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom98)}} the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom98) , year={October 1998} }