@incollection{, E09505FD03195C211DAC354B57B5BA2C , author={{RameshKait} and {Dr. KuldeepKherwal} and {Dr.C. Nelson KennedyBabu} and {Singhania University Rajsthan}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}12116367 } @incollection{b0, , title={{PGP in constrained wireless devices}} , author={{ MBrown } and { DCheung } and { DHankerson } and { JHernandez } and { MKirkup } and { AMenezes }} , booktitle={{Proceedings of the 9th USENIX Security Symposium}} the 9th USENIX Security Symposium , publisher={USENIX} , year={August 2000} } @incollection{b1, , title={{Mobile networking for smart dust}} , author={{ JMKahn } and { RHKatz } and { KSPister }} , booktitle={{ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'99)}} Seattle, WA, August99 } @incollection{b2, , title={{Zero commonknowledge authentications for pervasive networks}} , author={{ AWeimerskirch } and { DWesthoff }} , journal={{In: Selected Areas in Cryptography}} , year={2003} } @incollection{b3, , title={{Child-proof authentication for mipv6 (cam)}} , author={{ GO'shea } and { MRoe }} , journal={{SIGCOMM Computer. Communication Rev}} 31 , year={2001} } @incollection{b4, , title={{Statistically unique and cryptographically verifiable (sucv) identifiers and addresses}} , author={{ GMontenegro } and { CCastelluccia }} , booktitle={{Proceedings of the Network and Distributed System Security Symposium (NDSS)}} the Network and Distributed System Security Symposium (NDSS) , year={2002} } @incollection{b5, , title={{Identity-based cryptosystems and signature schemes}} , author={{ AShamir }} , booktitle={{Proceedings of CRYPTO '84}} CRYPTO '84 , publisher={Springer-Verlag} , year={1984} } @incollection{b6, , title={{Identity-based encryption from the weil pairing}} , author={{ DBoneh } and { MFranklin }} , booktitle={{Proceedings of CRYPTO 2001}} CRYPTO 2001 , publisher={Springer-Verlag} , year={2001} } @incollection{b7, , title={{An identity based encryption scheme based on quadratic residues}} , author={{ CCocks }} , booktitle={{Proceedings of IMA 2001}} IMA 2001 , publisher={Springer-Verlag} , year={2001} } @book{b8, , title={{Mobile Communications}} , author={{ JochenSchiller }} , year={2000} , publisher={Addison-Wesley} } @book{b9, , author={{ Krishna MoorthySivalingam }} , title={{Tutorial on Mobile Ad Hoc Networks}} , year={2003} } @book{b10, , title={{A review of current routing protocols for adhoc mobile wireless networks}} , author={{ ElizabethMRoyer } and { Chai-KeongToh }} , year={1999} University of California and Georgia Institute of Technology, USA , note={Technical report} } @incollection{b11, , title={{}} , journal={{Mobile Ad Hoc Networking Working Group -AODV}} } @book{b12, , title={{Mobile Ad Hoc Networking Working Group -DSR}} }