- Introduction
- Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks
- Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks
- Classification of Transport Layer Solutions
- TCP over Ad Hoc Wireless Networks
- Other Transport Layer Protocols for Ad Hoc Wireless Networks
- Security in Ad Hoc Wireless Networks
- Network Security Requirements
- Issues and Challenges in Security Provisioning
- Network Security Attacks
- Key Management
- Secure Routing in Ad Hoc Wireless Networks
- Summary
- Problems
- Bibliography
BIBLIOGRAPHY
"Transmission Control Protocol,"
IETF RFC 793, September 1981."Congestion Avoidance and Control,"
Proceedings of ACM SIG-COMM 1988, pp. 314-329, August 1988."TCP Slow Start, Congestion Avoidance, Fast Retransmission, and Fast Recovery Algorithms,"
IETF RFC 2001, January 1997."Improving the Start-Up Behavior of a Congestion Control Scheme for TCP,"
Proceedings of the ACM SIGCOMM 1996, pp. 270-280, August 1996.[5] M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow,
"TCP Selective Acknowledgment Options,"
IETF RFC 2018, October 1996.[6] S. Floyd, J. Mahdavi, M. Mathis, and M. Podolsky,
"An Extension to the Selective Acknowledgment (SACK) Option for TCP,"
IETF RFC 2883, July 2000.[7] M. Gerla, K. Tang, and R. Bagrodia,
"TCP Performance in Wireless Multi-Hop Networks,"
Proceedings of IEEE WMCSA 1999, pp. 41-50, February 1999."Analysis of TCP Performance over Mobile Ad Hoc Networks,"
Proceedings of ACM MOBICOM 1999, pp. 219-230, August 1999.[9] K. Chandran, S. Raghunathan, S. Venkatesan, and R. Prakash,
"A Feedback-Based Scheme for Improving TCP Performance in Ad Hoc Wireless Networks,"
IEEE Personal Communications Magazine, vol. 8, no. 1, pp. 34-39, February 2001.[10] D. Kim, C. K. Toh, and Y. Choi,
"TCP-BuS: Improving TCP Performance in Wireless Ad Hoc Networks,"
Journal of Communications and Networks, vol. 3, no. 2, pp. 1-12, June 2001."Associativity-Based Routing for Ad Hoc Mobile Networks,"
Wireless Personal Communications, vol. 4, no. 2, pp. 1-36, March 1997."ATCP: TCP for Mobile Ad Hoc Networks,"
IEEE Journal on Selected Areas in Communications, vol. 19, no. 7, pp. 1300-1315, July 2001.[13] S. Kopparty, S. V. Krishnamurthy, M. Faloutsos, and S. K. Tripathi,
"Split TCP for Mobile Ad Hoc Networks,"
Proceedings of IEEE GLOBECOM 2002, vol. 1, pp. 138-142, November 2002."ATP: Application Controlled Transport Protocol for Mobile Ad Hoc Networks,"
Proceedings of IEEE WCMC 1999, vol. 3, pp. 1318-1322, September 1999.[15] K. Sundaresan, V. Anantharaman, H. Y. Hsieh, and R. Sivakumar,
"ATP: A Reliable Transport Protocol for Ad Hoc Networks,"
Proceedings of ACM MOBIHOC 2003, pp. 64-75, June 2003.[16] Y. Hu, A. Perrig, and D. B. Johnson,
"Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks,"
Proceedings of IEEE INFOCOM 2003, vol. 3, pp. 1976-1986, April 2003.[17] B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens,
"An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,"
Proceedings of the ACM Workshop on Wireless Security 2002, pp. 21-30, September 2002.[18] C. E. Perkins and E. M. Royer,
"Ad Hoc On-Demand Distance Vector Routing,"
Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, pp. 90-100, February 1999.[19] Y. Hu, A. Perrig, and D. B. Johnson,
"Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,"
Proceedings of the ACM Workshop on Wireless Security 2003, pp. 30-40, September 2003."Securing Ad Hoc Networks,"
IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, December 1999.[21] A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
[22] A. Khalili, W. A. Arbaugh,
"Security of Wireless Ad Hoc Networks,"
http://www.cs.umd.edu/~aram/wireless/survey.pdf.[23] N. Asokan and P. Ginzboorg,
"Key-Agreement in Ad Hoc Networks,"
Computer Communications, vol. 23, no. 17, pp. 1627-1637, 2000.[24] S. Capkun, L. Buttyan, and J. P. Hubaux,
"Self-Organized Public-Key Management for Mobile Ad Hoc Networks,"
IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52-64, January-March 2003.[25] S. Yi, P. Naldurg, and R. Kravets,
"Security-Aware Ad Hoc Routing for Wireless Networks,"
Proceedings of ACM MOBIHOC 2001, pp. 299-302, October 2001.[26] Y. Hu, D. B. Johnson, and A. Perrig,
"SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,"
Proceedings of IEEE WMCSA 2002, pp. 3-13, June 2002.[27] C. E. Perkins and P. Bhagwat,
"Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,"
Proceedings of ACM SIG-COMM 1994, PP- 234-244, August 1994.[28] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M.B. Royer,
"A Secure Routing Protocol for Ad Hoc Networks,"
Proceedings of IEEE ICNP 2002, pp. 78-87, November 2002.[29] H. Deng, W. Li, and D. P. Agrawal,
"Routing Security in Wireless Ad Hoc Networks,"
IEEE Communications Magazine, vol. 40, no. 10, pp. 70-75, October 2002.[30] P. Papadimitratos and Z. J. Haas,
"Secure Routing: Secure Data Transmission in Mobile Ad Hoc Networks,"
Proceedings of ACM Workshop on Wireless Security 2003, pp. 41-50, September 2003.[31] A. Fasbender, D. Kesdogan, and O. Kubitz,
"Variable and Scalable Security: Protection of Location Information in Mobile IP,"
Proceedings of IEEE VTC 1996, vol. 2, pp. 963-967, May 1996.[32] Y. Hu, A. Perrig, and D. B. Johnson,