kit-text-size-adjust: auto; -webkit-te[1] B. Madhusudhanan, S. Chitra, and C. Rajan, "Mobility-based key management
technique for multicast security in mobile ad hoc networks.,"
ScientificWorldJournal., vol. 2015, p. 801632, 2015.
[2] K. Gomathi, B. Parvathavarthini, and C. Saravanakumar, "An Efficient Secure
Group Communication in MANET Using Fuzzy Trust Based Clustering and
Hierarchical Distributed Group Key Management," Wirel. Pers. Commun., vol.
94, no. 4, pp. 2149–2162, 2017.
[3] O. Younis, S. Essa, and A. Elsayed, "A New Group Key Management Scheme for
Mobile Adhoc Networks," in 2nd International Conference on Mathematics and
Applications (ICMA18), 2018.
[4] T. Singh, J. Singh, and S. Sharma, "Energy efficient secured routing protocol for
MANETs," Wirel. Networks, vol. 23, no. 4, pp. 1001–1009, 2017.
[5] V. Agrawal and H. Chauhan, "An Overview of security issues in Mobile Ad hoc
Networks," Int. J. Comput. Eng. Sci., pp. 1–9, 2014.
[6] S. Aluvala, K. Raja Sekhar, and D. Vodnala, "A novel technique for node
authentication in mobile ad hoc networks," Perspect. Sci., vol. 8, pp. 680–682,
2016.
[7] W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE Trans. Inf.
Theory, vol. 22, no. 6, pp. 644–654, 1976.
[8] S. Rafaeli and D. Hutchison, "A survey of key management for secure group
communication," ACM Comput. Surv., vol. 35, no. 3, pp. 309–329, 2003.
[9] H. Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc
networks," IEEE Commun. Mag., vol. 40, no. 10, pp. 70–75, 2002.
[10] L. Abusalah, a. Khokhar, and M. Guizani, "A survey of secure mobile Ad Hoc
routing protocols," IEEE Commun. Surv. Tutorials, vol. 10, no. 4, pp. 78–93,
2008.
[11] D. B. Johnsort, "Routing in Ad Hoc Networks of Mobile Hosts," Mob. Comput.
Syst. Appl. 1994. WMCSA 1994. First Work., pp. 158–163, 1994.
[12] V. Park and M. Corson, "A highly adaptive distributed routing algorithm for
mobile wireless networks,"…Annu.Jt.Conf.IEEE…,pp.1405–1413, 1997.
[13] S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in
mobile ad hoc networks," Proc. 6th Annu. Int. Conf. Mob. Comput. Netw. -
MobiCom’00,pp.255–265, 2000.
[14] J. J. Garcia-Luna-Aceves and M. Spohn, "Source-tree routing in wireless
networks," Proceedings. Seventh Int. Conf. Netw. Protoc., pp. 273–282, 1999.
[15] Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in
wireless sensor networks," IEEE Commun. Surv. Tutorials, vol. 8, no. 2, pp. 2–23,
2006.
[16] C. E. Perkins, E. M. Royer, and S. Das, "Ad-hoc on-demand distance vector
routing," Proc. - WMCSA’992ndIEEE Work. Mob. Comput. Syst. Appl., pp. 90–
100, 1999.
[17] M. G. Zapata, "Secure ad-hoc on-demand distance vector routing," ACM
SIGMOBILE Mob. Comput. Commun. Rev., vol. 6, no. 3, p. 106, 2002.
kit-text-stroke-width: 0px; "> [18] Y.-C. Hu and D. B. Johnson, "Securing quality-of-service route discovery in ondemand routing for ad hoc networks," Proc. 2nd ACM Work. Secure. ad hoc Sens.
networks - SASN’04,p.106,2004.
[19] X. Chen and J. Wu, "Multicasting techniques in mobile ad hoc networks," Handb.
ad hoc Wireless. networks, pp. 25–40, 2003.
[20] C. Science and S. Engineering, "Multicast routing protocols in MANETs," Int. J.
Adv. Res. Comput. Sci. Softw. Eng., vol. 2, no. 1, 2012.
[21] L. Junhai, Y. Danxia, X. Liu, F. Mingyu, and A. Voyiatzis, "A Survey of Multicast
Routing Protocols for Mobile Ad-Hoc Networks," J. Internet Eng., vol. 5, no. 1, pp.
331–344, 2012.
[22] M. Steiner, G. Tsudik, and M. Waidner, "CLIQUES: A New Approach to Group
Key Agreement," Proc. 18th {IEEE} Int. Conf. Distrib. Comput. Syst., pp. 380–
387, 1998.
[23] M. Burmester and Y. Desmedt, "A Secure and Efficient Conference Key
Distribution System," in Annual International Conference on the Theory and
Applications of Cryptographic Techniques, 1994, pp. 275–286.
[24] Y. Kim, A. Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for
dynamic collaborative groups," Proc. 7th ACM Conf. Comput. Commun. Secure.
- CCS’00,pp.235–244, 2000. [25] D. G. Steer, L. Strawczynski, W. Diffie, and M. Wiener, "A secure audio
teleconference system," in Advances in Cryptology --- CRYPTO, 1988, vol. 403,
pp. 520–528.