[1] J. J.-N. Liu and I. Chlamtac, “Mobile Ad-Hoc Networking with a View of 4G Wireless: Imperatives and Challenges,” in Mobile Ad Hoc Networking, edited by S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic (New York: IEEE Press, Wiley-Interscience, 2004).

[2] K. Pahlavan, P. Krishnamurthy, et al., “Handoff in Hybrid Mobile Data Networks,” IEEE Personal Communications (April 2000).

[3] I. Akyildiz, W. Su, Y. Sankarasubramanian, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Communications Magazines (Aug. 2002).

[4] D. Tipper, T. Dahlberg, H. Shin, and C. Charnsripinyo, “Providing Fault Tolerance in Wireless Access Networks,” IEEE Communications Magazine (Jan. 2002): 58–64.

[5] P. Krishnamurthy, D. Tipper, and Y. Qian, “The Interaction of Security and Survivability in Hybrid Wireless Networks,” WIA 2004, Proceedings of IEEE IPCCC 2004, Phoenix, AZ, April 14–17, 2004.

[6] Y. Qian, K. Lu, and D. Tipper, “Towards Survivable and Secure Wireless Sensor Networks,” WIA 2007, Proceedings of IEEE IPCCC 2007, New Orleans, LA, April 11–13, 2007.

[7] A. K. Salkintzis, C. Fors, and R. Pazhyannur, “WLAN-GPRS Integration for Next Generation Mobile Data Networks,” IEEE Wireless Communications (Oct. 2002).

[8] I. Akyildiz and X. Wang, “A Survey on Wireless Mesh Networks,” IEEE Communications Magazine, (Sept. 2005): 23–30.

[9] H. Luo, R. Ramjee, P. Sinha, L. Li, and S. Lu, “UCAN: A Unified Cellular and Ad Hoc Network Architecture,” ACM Mobicom (Sept. 2003): 353–367.

[10] K. Pahlavan and P. Krishnamurthy, Principles of Wireless Networks: A Unified Approach (Englewood Cliffs, NJ: Prentice Hall PTR, 2002).

[11] S. Fluhrer, I. Martin, and A. Shamir, “Weaknesses in Key Scheduling Algorithm of RC4,” Eighth Annual Workshop on Selected Areas in Cryptography, Aug. 2001.

[12] TR 33.102, “3GPP Security Architecture,” 3GPP release, 1999.

[13] D. Simon, B. Aboba, and T. Moore, “IEEE 802.11 Security and 802.1X,” IEEE 802.11 WG Document doc: IEEE 802.11–00/034r1, Mar. 2000.

[14] D. Djenouri, L. Khelladi, and N. Badache, “A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks,” IEEE Communications Surveys 7, No. 4 (2005).

[15] J. Zheng, M. J. Lee, and M. Anshel, “Toward Secure Low Rate Wireless Personal Area Networks,” IEEE Transactions on Mobile Computing 5, No. 10 (Oct. 2006): 1361–1373.

[16] E. Shi and A. Perrig, “Designing Secure Sensor Networks,” IEEE Wireless Communications (Dec. 2004): 38–43.

[17] P. E. Wirth, “Teletraffic Implications of Database Architectures in Mobile and Personal Communications,” IEEE Communications Magazine (June 1995): 54–59.

[18] Y. Lin, “Failure Restoration of Mobility Databases for Personal Communication Networks,” Wireless Networks, Vol. 1, No. 3, pp. 365–372, 1995.

[19] Y. Lin, “Per-User Checkpointing for Mobility Database Failure Restoration,” IEEE Transactions on Mobile Computing, Vol. 4, No. 1, Jan.–March, 2005.

[20] A. Hilt and P. Berzethy, “Recent Trends in Reliable Access Networking for GSM Systems,” Proceedings of Third International Workshop on the Design of Reliable Communication Networks, Budapest, Hungary, Oct. 2001.

[21] A. Dutta, and P. Kubat, “Design of partially survivable networks for cellular telecommunication systems,” European Journal of Operational Research, Vol. 118, (1999), pp. 52–64.

[22] Louis A. Cox, Jr., and Jennifer R. Sanchez, “Designing least-cost survivable wireless backhaul networks,” Journal of Heuristics, Vol. 6, (2000), pp. 525–540.

[23] P. Kubat, J. M. Smith and C. Yum, “Design of Cellular Networks with Diversity and Capacity Constraints,” IEEE Transactions on Reliability, Vol., 49, No. 2, (June 2000), pp. 165–175.

[24] A. P. Snow, U. Varshney, and A. D. Malloy, “Reliability and Survivability of Wireless and Mobile Networks,” IEEE Computer 33 (July 2000): 49–55.

[25] D. Tipper, S. Ramaswamy, and T. Dahlberg, “PCS Network Survivability,” Proceedings of IEEE Wireless Communications and Networking Conference (WCNC’99), New Orleans, LA, Sept. 1999.

[26] H. Shin, C. Charnsripinyo, D. Tipper, and T. Dahlberg, “The Effects of Failures in PCS Networks,” Proceedings of DRCN, Budapest, Hungary, Oct. 2001.

[27] D. Tipper, C. Charnsripinyo, H. Shin, and T. Dahlberg, “Survivability Analysis for Mobile Cellular Networks,” Proceedings CNDS 2002, San Antonio, TX, Jan. 27–31, 2002.

[28] The IST Caution Project at: http://www.telecom.ntua.gr/caution/start.html

[29] C. Charnsripinyo and D. Tipper, “Topological Design of 3G Wireless Back-haul Networks for Service Assurance,” Proceedings Fifth IEEE International Workshop on the Design of Reliable Communication Networks, (DRCN 2005), Oct. 17–19, 2005, Ischia, Italy.

[30] T. Dahlberg, D. Tipper, B. Cao, and C. Charnsripinyo, “Survivability in Wireless Mobile Networks,” pp. 81–114 in Reliability, Survivability, and Quality of Large Scale Telecommunication Systems, Ed. P. Stavroulakis, John Wiley & Sons, London, UK, 2003.

[31] J. Sterbenz, R. Krishnan, R. Hain, A. Jackson, D. Levin, R. Ramanathan, and J. Zhao, “Survivable Mobile Wireless Networks: Issues, Challenges, and Research Directions,” Proceedings of ACM Wireless Security Workshop (WiSe’02), Sept. 28, 2002, Atlanta, GA.

[32] K. Fall, “A Delay-Tolerant Network Architecture for Challenged Internets”, Proceedings of the ACM SIGCOMM 2003, Karlsruhe Germany, Aug. 2003, pp. 27–34.

[33] A. Zolfaghari and F. J. Kaudel, “Framework for Network Survivability Performance,” IEEE Journal on Sel. Areas in Comm. 12, No. 1 (Jan. 1994): 46–51.

[34] D. Grillo, “Personal Communications and Traffic Engineering in ITU-T: Developing E.750 Series of Recommendations,” IEEE Personal Communications (Dec. 1996): 16–28.

[35] NRIC, at http://www.nric.org/.

[36] M. Shin, A. Mishra, and W. Arbaugh, “Improving the Latency of 802.11 Hand-offs Using Neighbor Graphs,” Proceedings of MobiSys’04, Boston, MA, June 6–9, 2004.

[37] H. Velayos and G. Karlsson, “Techniques to Reduce the IEEE 802.11b Handoff Time,” Proceedings of IEEE ICC 2004, Paris, France, June 2004.

[38] S. Avancha, J. Undercoffer, A. Joshi, and J. Pinkston, “Security for Wireless Sensor Networks,” in Wireless Sensor Networks, edited by C. S. Raghavendra, K. M. Sivalingam, and T. Znati (New York: Kluwer Academic Publishers, 2004).

[39] Y. Law, R. Corin, S. Etalle, and P. Hartel, “A Formally Verified Decentralized Key Management for Wireless Sensor Networks,” Personal/Wireless Communications, LNCS 2775 (2003): 27–39.

[40] S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” Proceedings of IEEE Symposium on Research in Security and Privacy, May 2003.

[41] L. Eschenauer and V. D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proceedings of 9th ACM Conference on Computer and Communication Security, Nov. 2002.

[42] C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly- Secure Key Distribution for Dynamic Conferences,” Proceedings of Advances in Cryptology, CRYPTO’92, LNCS 740 (1993): 471–486.

[43] D. Liu, and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proceedings of the 10th ACM Conference on Computer and Communications Security, Oct. 2003.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset