@incollection{, 8B4DB6A094D66FEAB6E202BB9C18A0AD , author={{Dr. Mahendra KumarMishra} and {}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1181726 } @incollection{b0, , title={{Security aware Minimized Dominating Set based Routing in MANET}} , author={{ RPushpalakshmi } and { DrAVincent Antony } and { Kumar }} , booktitle={{IEEE 2010 Second International conference on Computing, Communication and Networking Technologies}} } @incollection{b1, , title={{SECURED BACKUP ROUTING PROTOCOL FOR AD HOC NETWORKS}} , author={{ GLavanya } and { CKumar } and { ARex } and { Arokiaraj }} , booktitle={{IEEE 2010 International Conference on Signal Acquisition and Processing}} } @book{b2, , title={{A-Kad: an anonymous P2P protocol based on Kad network}} , author={{ YongqingNi } and { DaehunNyang } and { XuWang }} IEEE 2009 } @book{b3, , title={{ASSOCIATION BETWEEN NODES TO COMBAT BLACKHOLE ATTACK IN DSR BASED MANET}} , author={{ NBhalaji } and { .ADr } and { Shanmugam }} IEEE 2009 } @incollection{b4, , title={{REAR: Realtime Energy Aware Routing for Wireless Adhoc Micro Sensors Network}} , author={{ SohailJabbar } and { AbidAliMinhas } and { Raja AdeelAkhtar } and { MuhammadZubairAziz }} , booktitle={{Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing}} , year={2009} } @incollection{b5, , title={{Performance Efficient EOMCT Algorithm for Secure Multicast Key Distribution for Mobile Adhoc Networks}} , author={{ DSuganya Devi } and { DrGPadmavathi }} , booktitle={{IEEE 2009 International Conference on Advances in Recent Technologies in Communication and Computing}} } @book{b6, , title={{Providing Source Privacy in Mobile Ad Hoc Networks}} , author={{ JianRen } and { YunLi } and { TongtongLi }} IEEE 2009 } @book{b7, , title={{Multigrade Security Monitoring for Ad-Hoc Wireless Networks}} , author={{ MatthewMatthew Tan Creti } and { SaurabhBeaman } and { ZhiyuanBagchi } and { Yung-HsiangLi } and { Lu }} , year={2009} , publisher={IEEE} } @incollection{b8, , title={{Sprite: A simple, Cheat-proof, Credit-based System for Mobile Ad hoc Networks}} , author={{ SZhong } and { JChen } and { YYang }} , booktitle={{Proceedings of IEEE Infocom}} IEEE Infocom , year={April 2003} } @book{b9, , title={{Securing Ad Hoc Networks}} , author={{ LZhou } and { ZHaas }} , year={November/December 1999} }