1. “K11012_C006.tex” — 144[#18] 2. Zhang, Y. and Lee, W. Intrusion detection techniques for mobile wireless networks, Wireless Networks, 9(5), 545–556. 3. Stajano, F. and Anderson, R. The Resurrecting Duckling: Security issues for ad-hoc wireless networks, in Proceedings of International Workshop on Security Protocols, Springer: Berlin/Heidelberg, 1999. 4. Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L. Security in mobile ad hoc networks: Challenges and solutions, IEEE Wireless Communications, 11(1), 38–47, 2004. 5. Perkins, C., Belding-Royer, E., and Das, S. RFC 3561: Ad hoc On-Demand Distance Vector (AODV) Routing, http://www.ietf.org/rfc/rfc3561.txt, 2003. 6. Yau, P.-W. and Mitchell, C.J. Security vulnerabilities in ad hoc networks, in Proceedings of the 7th International Symposium on Communications Theory and Applications, pp. 99–104, 2003. 7. Ning, P. and Sun, K. How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols, in Proceedings of the IEEE Workshop on Information Assurance, West Point, NY, USA, pp. 60–67, 2003. 8. Chivers, H. and Clark, J.A. Smart dust, friend or foe?—Replacing identity with configuration trust, Computer Networks, 46(5), 723–740, 2004. 9. Sun, B., Wu, K., and Pooch, U.W. Zone-based intrusion detection for mobile ad hoc networks, International Journal of Ad Hoc and Sensor Wireless Networks, 2(3), 2003. 10. Hubaux, J.-P., Buttyan, L., and Capkun, S. The quest for security in mobile ad hoc networks, In Proceedings of the 2nd ACM International Symposium on Mobile Ad hoc Networking & Computing, Long Beach, California, USA, pp. 146–155, 2001. 11. Kong, J., Hong, X., and Gerla, M. A new set of passive routing attacks in mobile ad hoc networks, in IEEE MILCOM, Boston, MA, USA, 2003. 12. Buchegger, S., Tissieres, C., Le Boudec, J.-Y. A test-bed for misbehaviour detection in mobile ad-hoc networks – how much can watchdogs really do?, Mobile Computing Systems and Applications (WMCSA ’04), pp. 102–111, 2004. 13. Yi, P., Dai, Z., Zhang, S., and Zhong, Y. A new routing attack in mobile ad hoc networks, International Journal of Information Technology, 11(2), pp. 83–94, 2005. 14. Wu, B., Chen, J., Wu, J., and Cardei, M. A survey on attacks and countermeasures in mobile ad hoc networks, Wireless/Mobile Network Security, Chapter 5, Springer: US, 2006. 15. Hu, Y.-C., Perrig, A., and Johnson, D.B. Rushing attacks and defence in wireless ad hoc network routing protocols, in Proceedings of the ACM Workshop on Wireless Security, 2003. 16. Karlof, C. and Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures, Ad Hoc Networks, 1(2–3), 293–315, 2003. 17. Hu, Y.-C., Perrig, A., and Johnson, D.B. Packet leashes: A defence against wormhole attacks in wireless ad hoc networks, in Proceedings of INFOCOM, San Francisco, USA, 2003. 18. Hu, Y.-C., Perrig, A., and Johnson, D.B. Ariadne: A secure on-demand routing protocol for ad hoc networks, in Proceedings of the 8th International Conference on Mobile Computing and Networks, pp. 12–23, 2002. 19. Sanzgiri, K., et al. A secure routing protocol for ad hoc networks, in Proceedings of the 10th IEEE Conference on Network Protocols, 2002. 20. Awerbuch, B., et al. An on demand secure routing protocol resilient to Byzantine failures, in Proceedings of the ACM Workshop on Wireless Security, Atlanta, GA, USA, 2002. 21. Diffie, W. and Hellman M. New directions in cryptography, IEEE Transactions on Information Theory, IT-22(6), 644–654, 1976. 22. Steiner, M., Tsudik, G., and Waidner, M. Diffie-Hellman key distribution extended to group communication, in Proceedings of the ACM Conference on Computer and Communication Security, New Delhi, India, pp. 31–37, 1996. 23. Bellovin, S.M. and Merritt, M. Encrypted key exchange: Password-based protocols secure against dictionary attacks, in IEEE Symposium on Security and Privacy, pp. 72–84, 1992. 24. Shamir, A. How to share a secret, Communications of the ACM, 22(11), 612–613, 1979. 25. Zhou, L. and Haas, Z.J. Securing ad hoc networks, IEEE Network, 13(6), 24–30, 1999. 26. Yi, S., Kravets, R. MOCA: Mobile certificate authority for wireless ad hoc networks, in The 2nd Annual PKI Research Workshop, 2003.