[1]
|
Holland, G. and Vaidya, N. (1999) Analysis of TCP Performance over Mobile AD Hoc Networks. Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Seattle, 15-19 August 1999, 219-230.
|
[2]
|
Hoe, J.C. (1996) Improving the Start-Up Behavior of a Congestion Control Scheme for TCP. ACM SIGCOMM Computer Communication Review, 26, 270-280. http://dx.doi.org/10.1145/248157.248180
|
[3]
|
Xu, S. and Saadawi, T. (2002) Performance Evaluation of TCP Algorithms in Multi-Hop Wireless Packet Networks. Journal of Wireless Communication and Mobile Computing, 2, 85-100. http://dx.doi.org/10.1002/wcm.35
|
[4]
|
Chandran, K., Ragbunathan, S., Venkatesan, S. and Prakash, R. (1998) A Feedback Based Scheme for Improving TCP Performance in Ad-Hoc Wireless Networks. Proceedings of 18th International Conference on Distributed Computing Systems, 472-479.
|
[5]
|
Sundaresan, K., Anantharaman, V., Hsieh, H.Y. and Sivakumar, R. (2005) ATP: A Reliable Transport Protocol for Ad Hoc Networks. IEEE Transactions on Mobile Computing, 4, 588-603. http://dx.doi.org/10.1109/TMC.2005.81
|
[6]
|
Singh, H., Saxena, S. and Singh, S. (2004) Energy Consumption of TCP in ad hoc Networks. Wireless Network, 10, 531-542. http://dx.doi.org/10.1023/B:WINE.0000036456.85213.45
|
[7]
|
Kopparty, S., Krishnamurthy, S.V., Faloutsos, M. and Tripathi, S.K. (2002) Split TCP for Mobile Ad Hoc Networks. Proceedings of the IEEE Global Communications Conference (GLOBECOM 2002), Taipei, 17-21 November 2002, 138-142.
|
[8]
|
Liu, J. and Singh, S. (2001) ATCP: TCP for Mobile ad Hoc Networks. IEEE JSAC, 19, 1300-1315.
|
[9]
|
Kim, D., Toh, C.K. and Choi, Y. (2000) TCP-BuS: Improving TCP Performance in Wireless Ad Hoc Networks. Proceedings of IEEE International Conference on Communications (ICC), 3, 1707-1713.
|
[10]
|
Wu, B., Chen, J., Wu, J. and Cardei, M. (2007) A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. Wireless Network Security. Springer, New York.
|
[11]
|
Ghosh, U. and Datta, R. (2013) P-TCP: A Prediction Based Secure Transmission Control Protocol for Wireless Ad Hoc Networks. IETE Journal of Research, 59, 364-375. http://dx.doi.org/10.4103/0377-2063.118029
|
[12]
|
Al Hanbali, A., Altman, E. and Nain, P. (2005) A Survey of TCP over Ad Hoc Networks. IEEE Communications Surveys Tutorials, 7, 22-36. http://dx.doi.org/10.1109/COMST.2005.1610548
|
[13]
|
Wang, F. and Zhang, Y. (2002) Improving TCP Performance over Mobile Ad Hoc Networks with Out-of-Order Detection and Response. Proceedings of ACM MOBIHOC, 217-225.
|
[14]
|
Dyer, T. and Boppana, R. (2001) A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad Hoc Networks. Proceedings of ACM MOBIHOC, 56-66.
|
[15]
|
Leung, K.C. and Li, V.O.K. (2006) Transmission Control Protocol (TCP) in Wireless Networks: Issues, Approaches, and Challenges. IEEE Communications Surveys Tutorials, 8, 64-79. http://dx.doi.org/10.1109/COMST.2006.283822
|
[16]
|
Zheng, Q., Hong, X., Liu, J. and Tang, L. (2007) A Secure Data Transmission Scheme for Mobile Ad Hoc Networks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), Washington, 26-30 November 2007, 1006-1010.
|
[17]
|
Papadimitratos, P. and Haas, Z.J. (2006) Secure Data Communication in Mobile Ad Hoc Networks. IEEE Journal on Selected Areas in Communications, 24, 343-356. http://dx.doi.org/10.1109/JSAC.2005.861392
|
[18]
|
Ghosh, U. and Datta, R. (2011) Identity Based Secure AODV and TCP for Mobile Ad Hoc Networks. Proceedings of ACM ACWR, 339-346.
|
[19]
|
Diffie, W. and Hellman, M.E. (1976) New Directions in Cryptography. IEEE Transactions on Information Theory, 22, 644-654. http://dx.doi.org/10.1109/TIT.1976.1055638
|
[20]
|
IP Security Protocol (IPSEC). http://www.ietf.org/html.charters/ipsp-charter.html
|
[21]
|
Ramakrishnan, K.K., Floyd, S., Black, D. and Ramakrishnan, G.K. (2001) The Addition of Explicit Congestion Notification (ECN) to IP.
|
[22]
|
de Oliveira, R. and Braun, T. (2002) TCP in Wireless Mobile Ad Hoc Networks. Technical Report.
|
[23]
|
Kaufman, C., Perlman, R. and Speciner, M. (2002) Network Security Private Communication in a Public World. Prentice Hall PTR, Upper Saddle River.
|
[24]
|
Ghosh, U. and Datta, R. (2013) SDRP: A Secure and Dynamic Routing Protocol for Mobile Ad Hoc Networks. IET Networks.
|
[25]
|
Ghosh, U. and Datta, R. (2012) A Novel Signature Scheme to Secure Distributed Dynamic Address Configuration Protocol in Mobile Ad Hoc Networks. IEEE WCNC, 2700-2705.
|
[26]
|
Ghosh, U. and Datta, R. (2011) A Secure Dynamic IP Configuration Scheme for Mobile Ad Hoc Networks. Ad Hoc Networks, 9, 1327-1342. http://dx.doi.org/10.1016/j.adhoc.2011.02.008
|
[27]
|
Sakai, R., Ohgishi, K. and Kasahara, M. (2000) Cryptosystems Based on Pairings. The 2000 Symposium on Cryptography and Information Security, 26-28.
|
[28]
|
Alnumay, W.S., Ghosh, U. and Chatterjee, P. (2014) SA-TCP: A Secure and Adaptive TCP for Wireless Ad Hoc Networks. Frontier and Innovation in Future Computing and Communications, 1-9.
|
[29]
|
Stoica, P., Friedlander, B. and Soderstrom, T. (1986) Least-Squares, Yule-Walker, and Overdetermined Yule-Walker Estimation of AR Parameters: A Monte Carlo Analysis of Finite-Sample Properties. International Journal of Control, 43, 13-27. http://dx.doi.org/10.1080/00207178608933446
|
[30]
|
Chen, K., Xue, Y. and Nahrstedt, K. (2003) On Setting TCP’s Congestion Window Limit in Mobile Ad Hoc Networks. Proceedings of IEEE International Conference on Communications, Alaska.
|