Referencias


[1] I. Chlamtac, M. Conti, Jennifer J., N. Liu, “Mobile Ad Hoc Networking: Imperatives and Challenges”, Ad Hoc Networks, pp. 13-64, 2003.
[2] M.A. Azer, S.M. El-Kassas, M.S. El-Soudani, “Security in Ad Hoc Networks: From Vulnerability to Risk Management”, IEEE International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), pp. 203-209, 2009.
[3] M.O. Pervaiz, M. Cardei, J. Wu, “Network Security “, chapter Routing Security in Ad Hoc Wireless Networks, pp. 117.142, Springer 2010.
[4] S. Sudin, A. Tretiakov, R. Haslinda, R.M. Ali, M.E. Rusli, “Attacks on Mobile Networks: An Overview of New Security Challenge”, IEEE Int. Conference on Electronic Design, pp. 1-6, 2008.
[5] B. Wu, J. Chen, J. Wu and M. Cardei, “Wireless/Mobile Network Security”, chapter A survey on attacks and countermeasures in mobile ad hoc networks, pp. 1-38, Springer 2006.
[6] A. Boukerche, Y. Ren, “A Trust-based Security System for Ubiquitous and Pervasive Computing Environments”, Computer Communications, Vol. 31, pp. 4343-4351, 2008.
[7] R.L. Gilaberte, L.P. Herrero, “A Secure Routing Rrotocol for Ad Hoc Networks Based on Trust”, IEEE Int. Conference on Networking and Services (ICNS), pp. 1-6, 2007.
[8] A. Nadeem, M. Howarth, “A Generalized Intrusion Detection & Prevention Mechanism for Securing MANETs”, IEEE Int. Conference on Ultra Modern Telecommunications & Workshops, pp. 1-6, 2009.
[9] M.A. Azer, S.M. El-Kassas, M.S. El-Soudani, “An Innovative Approach for the Wormhole Attack Detection and Prevention in Wireless Ad Hoc Networks”, IEEE Int. Conference on Networking, Sensing and Control (ICNSC), pp. 366-371, 2010.
[10] P. García-Teodoro, J.E. Díaz-Verdejo, G. Maciá-Fernández, E. Vázquez, “Anomaly-based Network Intrusion Detection: Techniques, Systems and Challenges”, Computers & Security, Vol. 28, pp. 18-28, 2009.
[11] Y. Deswarte, D. Powell, “Internet Security: An Intrusion-Tolerance Approach”, Proceedings of the IEEE, Vol. 94 (2), pp. 432-441, 2006.
[12] B. Foo, M. Glause, G. Howard, Y. S. Wu, S. Bagchi, E. Spafford, “Intrusion Response Systems: A Survey”, Tech. Report CERIAS TR 2008-4, Purdue University, 2008.
[13] C.A. Carver Jr., “Intrusion Response Systems: A Survey”, Department of Computer Science, Texas A&M University, College Station, 2001.
[14] M.N. Lima, A.L. dos Santos, G. Pujolle, “A Survey of Survivability in Mobile Ad Hoc Networks”, IEEE Communications Surveys & Tutorials, Vol. 11 (1), p. 66-77, 2009
[15] W. Stallings, “Cryptography and Network Security”, Fourth Edition, Prentice Hall, 2006.
[16] L. Buttyán, J.P. Hubaux, “Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing”,Cambridge University Press, 2008.
[17] R. Shrestha, K. H. Han, D. Y. Choi, S. J. Han, “A Novel Cross Layer Intrusion Detection System in MANET”, IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 647-654, 2010.
[18] N. Stakhanova, S. Basu, J. Wong, “A Taxonomy of Intrusion Response Systems”, Int. Journal of Information and Computer Security, Vol. 1 (1-2), pp. 169-184, 2007.