@incollection{, B787E1762332F6DFBD919EE16D7B45EE , author={{D V SrihariBabu}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}155915 } @incollection{b0, , title={{Secure Routing and Intrusion Detection in Ad hoc Networks}} , author={{ APatwardhan } and { JParker } and { AJoshi } and { AKarygiannis } and { MIorga }} , booktitle={{3 rd IEEE International Conference on Pervasive Computing and Communications}} Kauaii Island, Hawaii , year={March 2005} } @incollection{b1, , title={{Authenticated Routing for Ad Hoc Networks}} , author={{ KSanzgiri } and { DLaFlamme } and { BDahill } and { BNLevine } and { CShields } and { EMBelding-Royer }} , journal={{Proceedings of IEEE Journal on Selected Areas in Communications}} 23 3 , year={March 2005} } @incollection{b2, , title={{A robust pair-wise and group key management protocol for wireless sensor network}} , author={{ MRahman } and { SSampalli } and { SHussain }} , booktitle={{GLOBECOM Workshops (GC Wkshps)}} Miami, FL , year={2010. 2010} } @incollection{b3, , title={{Enhancing S-LEACH security for wireless sensor networks}} , author={{ MEl-Saadawy } and { EShaaban }} , booktitle={{Electro/Information Technology (EIT), 2012 IEEE International Conference on}} , year={2012} } @incollection{b4, , title={{Providing transparent security services to sensor networks}} , author={{ HSoroush } and { MSalajegheh } and { TDimitriou }} , journal={{Communications}} , year={2007. 2007} } @incollection{b5, , title={{A Secure Energy Efficiency Routing Approach In Wireless Sensor Networks}} , author={{ AnuradhaGarg } and { AjayTiwari } and { Hemant KumarGarg }} , journal={{International Journal of Engineering and Advanced Technology (IJEAT)}} 2 , year={February 2013} } @incollection{b6, , title={{Comparative study of wireless sensor networks energy-efficient topologies and power save protocols}} , author={{ ENiewiadomska-Szynkiewicz } and { PKwaoeniewski } and { IWindyga }} , journal={{J. Telecom. Inform. Technol}} 3 , year={2009} } @incollection{b7, , title={{A comparative study of various security approaches used in wireless sensor networks}} , author={{ KSharma } and { MKGhose } and { DKumar }} , journal={{Int. J. Adv. Sci. Technol}} 17 , year={2010} } @incollection{b8, , title={{Analysis of security protocols for Wireless Sensor Networks}} , author={{ MAhmad } and { MHabib } and { JMuhammad }} , booktitle={{Proc. 3rd Int. Conf. Comp. Res. Develop. ICCRD}} 3rd Int. Conf. Comp. Res. Develop. ICCRDShanghai, China , year={2011. 2011} 2 } @incollection{b9, , title={{Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers}} , author={{ CEPerkins } and { PBhagwat }} , booktitle={{Proceedings of SIGCOMM 1994}} SIGCOMM 1994 , year={1994} } @incollection{b10, , title={{A Security-Aware Routing Protocol for Wireless Ad hoc Networks}} , author={{ SYi } and { PNaldurg } and { RKravets }} , booktitle={{th World Multi-Conference on Systemics, Cybernetics and Informatics}} , year={2002} , note={SCI 2002} } @incollection{b11, , title={{Intrusion Detection in Wireless Ad hoc Networks}} , author={{ YZhang } and { WLee }} , booktitle={{Mobicom'00}} Boston, MA, USA , year={2000} } @book{b12, , title={{Intrusion Detection in Wireless Ad-Hoc Networks}} , author={{ FHWai } and { YNAye } and { James } and { NH }} , year={2005} School of Computing, National University of Singapore , note={CS4274 Introduction to Mobile Computing, term paper} } @incollection{b13, , title={{Defense of trust management vulnerabilities in distributed networks}} , author={{ YSun } and { ZHan } and { KJ RLiu }} , journal={{IEEE Communications Magazine}} 46 2 , year={February 2008} } @incollection{b14, , title={{Authentication and Anti-replay Security Protocol for Wireless Sensor Networks}} , author={{ LGheorghe } and { RRughinis } and { RDeaconescu } and { NTapus }} , booktitle={{Systems and Networks Communications (ICSNC), 2010 Fifth International Conference on}} Nice, France , year={2010} } @incollection{b15, , title={{On the Security of Route Discovery in MANETs}} , author={{ MikeBurmester } and { Breno De Medeiros }} , journal={{IEEE Transactions On Mobile Computing}} , year={March 1, 2008} } @incollection{b16, , title={{Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks}} , author={{ EAhmed } and { KSamad } and { WMahmood }} , booktitle={{Aus CERT2006 R&D Stream Program, Information Technology Security Conference}} , year={May 2006} } @incollection{b17, , title={{Security in mobile ad hoc networks: Challenges and solutions}} , author={{ HaoYang } and { HaiyunLuo } and { FanYe } and { SongwuLu } and { LixiaZhang }} , journal={{IEEE Wireless Communications}} 11 , year={Feb., 2004} } @incollection{b18, , title={{Authenticated Routing for Ad Hoc Networks}} , author={{ KSanzgiri } and { DLaflamme } and { BDahill } and { BNLevine } and { CShields } and { EMBelding-Royer }} , journal={{Proceedings of IEEE Journal on Selected Areas in Communications}} 23 3 , year={March 2005} } @incollection{b19, , title={{Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks}} , author={{ YCHu } and { APerrig } and { DBJohnson }} , booktitle={{Proc. MobiCom'02}} MobiCom'02Atlanta, GA , year={September 2002} } @incollection{b20, , title={{A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks}} , author={{ BWu } and { JChen } and { JWu } and { MCardei }} , booktitle={{Wireless/Mobile Network Security}} , publisher={Springer} , year={2006} 17 } @incollection{b21, , title={{Talking to Strangers: Authentication in Ad hoc Wireless Networks}} , author={{ DBalfanz } and { DSmetters } and { PStewart } and { HWong }} , booktitle={{Proceedings of the Symposium on Network and Distributed Systems Security (NDSS '02)}} the Symposium on Network and Distributed Systems Security (NDSS '02)San Diego, California , year={February 2002} } @book{b22, , title={{Optimized Link State Routing Protocol}} , author={{ Th } and { Clausen }} , year={July 2003} , note={IETF Internet draft, draft-ietfmanet-olsr-11.txt} } @incollection{b23, , title={{Secure routing for mobile ad hoc networks}} , author={{ PPapadimitratos } and { ZHaas }} , booktitle={{Proc. SCS Communication Networks and Distributed Systems Modeling and Simulation Conference}} SCS Communication Networks and Distributed Systems Modeling and Simulation Conference , year={2002. 2002} } @incollection{b24, , title={{Enhancing intrusion detection in wireless networks using radio frequency ngerprinting}} , author={{ JHall } and { MBarbeau } and { EKranakis }} , booktitle={{IASTED International Conference on Communications, Internet, and Information Technology}} St. Thomas, US Virgin Islands , year={2004. 2004} } @incollection{b25, , title={{SERP: secure energy-efficient routing protocol for densely deployed wireless sensor network}} , author={{ AKPathan } and { CSHong }} , journal={{Annales des Telecomm}} , year={2008} } @incollection{b26, , title={{Energy efficiency routing with node compromised resistance in wireless sensor networks}} , author={{ KLin } and { ChFLai } and { XLiu } and { XGuan }} , journal={{Mob. Netw. Appl}} 17 , year={2012} } @incollection{b27, , title={{A dynamic en-route scheme for filtering false data injection in wireless sensor networks}} , author={{ ZYu } and { YGuan }} , booktitle={{Proc. 25th IEEE Int. Conf. Com. Commun. INFOCOM}} 25th IEEE Int. Conf. Com. Commun. INFOCOMBarcelona, Spain , year={2006. 2006} } @incollection{b28, , title={{SPINS: security protocols for sensor networks}} , author={{ APerrig } and { RSzewczyk } and { JDTygar } and { VWen } and { DCuller }} , journal={{Wirel. Netw}} 8 5 , year={2002} } @incollection{b29, , title={{TinySec: a link layer security architecture for wireless sensor networks}} , author={{ CKarlof } and { NSastry } and { DWagner }} , booktitle={{Proc. 2 nd Int. Conf. Embedded Networked Sensor Sys}} 2 nd Int. Conf. Embedded Networked Sensor SysBaltimore, MD, USA , year={2004} } @incollection{b30, , title={{Energy Efficient, Power Aware Routing Algorithm For Sensor Network}} , author={{ AAjina }} , journal={{International Journal of Computer Theory and Engineering}} 3 1 , year={1793-8201, February-2011} }