[1] J. J.-N. Liu and I. Chlamtac, “Mobile Ad-Hoc Networking with a View of 4G Wireless: Imperatives and Challenges,” in Mobile Ad Hoc Networking, edited by S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic (New York: IEEE Press, Wiley-Interscience, 2004).
[2] K. Pahlavan, P. Krishnamurthy, et al., “Handoff in Hybrid Mobile Data Networks,” IEEE Personal Communications (April 2000).
[3] I. Akyildiz, W. Su, Y. Sankarasubramanian, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Communications Magazines (Aug. 2002).
[4] D. Tipper, T. Dahlberg, H. Shin, and C. Charnsripinyo, “Providing Fault Tolerance in Wireless Access Networks,” IEEE Communications Magazine (Jan. 2002): 58–64.
[5] P. Krishnamurthy, D. Tipper, and Y. Qian, “The Interaction of Security and Survivability in Hybrid Wireless Networks,” WIA 2004, Proceedings of IEEE IPCCC 2004, Phoenix, AZ, April 14–17, 2004.
[6] Y. Qian, K. Lu, and D. Tipper, “Towards Survivable and Secure Wireless Sensor Networks,” WIA 2007, Proceedings of IEEE IPCCC 2007, New Orleans, LA, April 11–13, 2007.
[7] A. K. Salkintzis, C. Fors, and R. Pazhyannur, “WLAN-GPRS Integration for Next Generation Mobile Data Networks,” IEEE Wireless Communications (Oct. 2002).
[8] I. Akyildiz and X. Wang, “A Survey on Wireless Mesh Networks,” IEEE Communications Magazine, (Sept. 2005): 23–30.
[9] H. Luo, R. Ramjee, P. Sinha, L. Li, and S. Lu, “UCAN: A Unified Cellular and Ad Hoc Network Architecture,” ACM Mobicom (Sept. 2003): 353–367.
[10] K. Pahlavan and P. Krishnamurthy, Principles of Wireless Networks: A Unified Approach (Englewood Cliffs, NJ: Prentice Hall PTR, 2002).
[11] S. Fluhrer, I. Martin, and A. Shamir, “Weaknesses in Key Scheduling Algorithm of RC4,” Eighth Annual Workshop on Selected Areas in Cryptography, Aug. 2001.
[12] TR 33.102, “3GPP Security Architecture,” 3GPP release, 1999.
[13] D. Simon, B. Aboba, and T. Moore, “IEEE 802.11 Security and 802.1X,” IEEE 802.11 WG Document doc: IEEE 802.11–00/034r1, Mar. 2000.
[14] D. Djenouri, L. Khelladi, and N. Badache, “A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks,” IEEE Communications Surveys 7, No. 4 (2005).
[15] J. Zheng, M. J. Lee, and M. Anshel, “Toward Secure Low Rate Wireless Personal Area Networks,” IEEE Transactions on Mobile Computing 5, No. 10 (Oct. 2006): 1361–1373.
[16] E. Shi and A. Perrig, “Designing Secure Sensor Networks,” IEEE Wireless Communications (Dec. 2004): 38–43.
[17] P. E. Wirth, “Teletraffic Implications of Database Architectures in Mobile and Personal Communications,” IEEE Communications Magazine (June 1995): 54–59.
[18] Y. Lin, “Failure Restoration of Mobility Databases for Personal Communication Networks,” Wireless Networks, Vol. 1, No. 3, pp. 365–372, 1995.
[19] Y. Lin, “Per-User Checkpointing for Mobility Database Failure Restoration,” IEEE Transactions on Mobile Computing, Vol. 4, No. 1, Jan.–March, 2005.
[20] A. Hilt and P. Berzethy, “Recent Trends in Reliable Access Networking for GSM Systems,” Proceedings of Third International Workshop on the Design of Reliable Communication Networks, Budapest, Hungary, Oct. 2001.
[21] A. Dutta, and P. Kubat, “Design of partially survivable networks for cellular telecommunication systems,” European Journal of Operational Research, Vol. 118, (1999), pp. 52–64.
[22] Louis A. Cox, Jr., and Jennifer R. Sanchez, “Designing least-cost survivable wireless backhaul networks,” Journal of Heuristics, Vol. 6, (2000), pp. 525–540.
[23] P. Kubat, J. M. Smith and C. Yum, “Design of Cellular Networks with Diversity and Capacity Constraints,” IEEE Transactions on Reliability, Vol., 49, No. 2, (June 2000), pp. 165–175.
[24] A. P. Snow, U. Varshney, and A. D. Malloy, “Reliability and Survivability of Wireless and Mobile Networks,” IEEE Computer 33 (July 2000): 49–55.
[25] D. Tipper, S. Ramaswamy, and T. Dahlberg, “PCS Network Survivability,” Proceedings of IEEE Wireless Communications and Networking Conference (WCNC’99), New Orleans, LA, Sept. 1999.
[26] H. Shin, C. Charnsripinyo, D. Tipper, and T. Dahlberg, “The Effects of Failures in PCS Networks,” Proceedings of DRCN, Budapest, Hungary, Oct. 2001.
[27] D. Tipper, C. Charnsripinyo, H. Shin, and T. Dahlberg, “Survivability Analysis for Mobile Cellular Networks,” Proceedings CNDS 2002, San Antonio, TX, Jan. 27–31, 2002.
[28] The IST Caution Project at: http://www.telecom.ntua.gr/caution/start.html
[29] C. Charnsripinyo and D. Tipper, “Topological Design of 3G Wireless Back-haul Networks for Service Assurance,” Proceedings Fifth IEEE International Workshop on the Design of Reliable Communication Networks, (DRCN 2005), Oct. 17–19, 2005, Ischia, Italy.
[30] T. Dahlberg, D. Tipper, B. Cao, and C. Charnsripinyo, “Survivability in Wireless Mobile Networks,” pp. 81–114 in Reliability, Survivability, and Quality of Large Scale Telecommunication Systems, Ed. P. Stavroulakis, John Wiley & Sons, London, UK, 2003.
[31] J. Sterbenz, R. Krishnan, R. Hain, A. Jackson, D. Levin, R. Ramanathan, and J. Zhao, “Survivable Mobile Wireless Networks: Issues, Challenges, and Research Directions,” Proceedings of ACM Wireless Security Workshop (WiSe’02), Sept. 28, 2002, Atlanta, GA.
[32] K. Fall, “A Delay-Tolerant Network Architecture for Challenged Internets”, Proceedings of the ACM SIGCOMM 2003, Karlsruhe Germany, Aug. 2003, pp. 27–34.
[33] A. Zolfaghari and F. J. Kaudel, “Framework for Network Survivability Performance,” IEEE Journal on Sel. Areas in Comm. 12, No. 1 (Jan. 1994): 46–51.
[34] D. Grillo, “Personal Communications and Traffic Engineering in ITU-T: Developing E.750 Series of Recommendations,” IEEE Personal Communications (Dec. 1996): 16–28.
[35] NRIC, at http://www.nric.org/.
[36] M. Shin, A. Mishra, and W. Arbaugh, “Improving the Latency of 802.11 Hand-offs Using Neighbor Graphs,” Proceedings of MobiSys’04, Boston, MA, June 6–9, 2004.
[37] H. Velayos and G. Karlsson, “Techniques to Reduce the IEEE 802.11b Handoff Time,” Proceedings of IEEE ICC 2004, Paris, France, June 2004.
[38] S. Avancha, J. Undercoffer, A. Joshi, and J. Pinkston, “Security for Wireless Sensor Networks,” in Wireless Sensor Networks, edited by C. S. Raghavendra, K. M. Sivalingam, and T. Znati (New York: Kluwer Academic Publishers, 2004).
[39] Y. Law, R. Corin, S. Etalle, and P. Hartel, “A Formally Verified Decentralized Key Management for Wireless Sensor Networks,” Personal/Wireless Communications, LNCS 2775 (2003): 27–39.
[40] S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” Proceedings of IEEE Symposium on Research in Security and Privacy, May 2003.
[41] L. Eschenauer and V. D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proceedings of 9th ACM Conference on Computer and Communication Security, Nov. 2002.
[42] C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly- Secure Key Distribution for Dynamic Conferences,” Proceedings of Advances in Cryptology, CRYPTO’92, LNCS 740 (1993): 471–486.
[43] D. Liu, and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proceedings of the 10th ACM Conference on Computer and Communications Security, Oct. 2003.