[1] Syamir A. How to share secret. Communications of ACM,Nov. 1979, 22(11): 612-613.[2] Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust andubiquitous security support for mobile ad-hoc networks. In Proc. ICNP,Riverside, USA, Nov.11-14, 2001, pp.251-260.[3] Yang H, Shu J, Meng X, Lu S. SCAN: Self-organized network-layersecurity in mobile ad hoc networks. IEEE Journal on Selected Areasin Communications, Feb. 2006, 24(2): 261-273.[4] Luo H, Kong J, Zerfos P, Lu S, Zhang L. URSA: Ubiquitous androbust access control for mobile ad hoc network. IEEE/ACMTransactions on Networking, Dec. 2004, 12(6): 1049-1063.[5] Chen W, Lee H. Modelling threshold secret sharing schemes in adhoc networks. In Proc. International Conference on Networking,Architecture, and Storage, Chongqing, China, Jun.12-14, 2008, pp.207-214.[6] Wang G, Wang Q, Cao J, Guo M. An effective trust establishmentscheme for authentication in mobile ad-hoc networks. In Proc. the 7th IEEEInternational Conference on Computer and Information Technology, Aizu, Japan, Oct.16-19,2007, pp.749-754.[7] Yi S, Kravets R. Key management for heterogeneous ad hocwireless networks. In Proc. the 10th IEEE International Conference on NetworkProtocols (ICNP,2002), Paris, France, Nov.12-15, 2002, pp.202-205.[8] Yi S, Kravets R. Moca: Mobile certificate authority for wirelessad hoc networks. In Proc. the 2nd Annual PKI Research Workshop (PKI,2003),Gaithersburg, USA, Apr.28-29, 2003.[9] Sen J, Subramanyam H. An efficient certificate authority for adhoc networks. In Proc. the 4th Int. Conf. Distributed Computing andInternet Technology, Bhubaneswar, India, Dec.22-24, 2005, pp.97-109.[10] Wu B, Wu J, Fernandez E B, Ilyas M, Magliveras S. Secure andefficient key management in mobile ad hoc networks. Journal ofNetwork and Computer Applications, 2007, 30(3): 937-954.[11] Tarmizi S, Veeraraghavan P, Ghosh S. Extending thecollaboration boundary in localized threshold cryptography-basedschemes for MANETs. In Proc. 2009 IEEE 9th Malaysian InternationalConference on Communications, Kuala Lumpur, Malaysia, Dec.15-17, 2009,pp.15-17.[12] Djenouri D, Khelladi L, Badache N. A survey of security issuesin mobile ad hoc and sensor networks. IEEE Communications Surveys& Tutorials, 2005, 7(4): 2-28.[13] Zhou L, Haas Z J. Securing ad hoc networks. IEEE Network,Nov./Dec. 1999, 13(6): 24-30.[14] Bettstetter C. On the minimum node degree and connectivity of awireless multihop network. In Proc. MOBIHOC,2002, Lausanne, Switzerland,Jun.9-11, 2002, pp.80-91.[15] Jeng A A, Jan R. The r-neighbourhood graph: An adjustablestructure for topology control in wireless ad hoc networks. IEEETransaction on Parallel and Distributed Systems, Apr. 2007, 18(4): 536-549.[16] Deng J, Han Y S, Chen P, Varshney P K. Optimal transmissionrange for wireless ad hoc networks based on energy efficiency. IEEE Transactions on Communications, Sept. 2007, 55(9): 1772-1782.[17] Park I, Kim J, Pu I. Blocking expanding ring search algorithmfor efficient energy consumption in mobile ad hoc networks.http://hal.archives-ouvertes.fr/docs/00/05/46/87/PDF/22-Park.pdf.[18] Al-Rodhaan M A, Mackenzie L, Ould-Khaoua M. Improvement toblocking expanding ring search for MANETs.http://www.dcs.gla.ac.uk/publications/PAPERS/8939 /B-ERS+.pdf. |