[[1] Bagrodia R., Meyerr R., PARSEC: A Parallel Simulation Environment for Complex System, UCLA technical report, 1997.]Search in Google Scholar
[[2] Broch, J., Maltz A.D., Johnson B.D., Hu C.Y., Jetcheva J., A performance comparison of multi-hop wireless ad hoc network routing protocols, Journal of Mobile Computing and Networking, 1998, 85-97.10.1145/288235.288256]Search in Google Scholar
[[3] Capkun S.,Buttya L., Hubaux J.P., Self-Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions On Mobile Computing, 2, 1, 2003,1-13.10.1109/TMC.2003.1195151]Search in Google Scholar
[[4] Corson S., Macker J., Mobile Ad hoc Networking (MANET): routing protocol performance issues and evaluation considerations, Network Working Group, RFC:2501,1999.10.17487/rfc2501]Search in Google Scholar
[[5] Eastlake D., Jones P., US secure hash algorithm 1 (SHA1). Network Working Group.RFC-3174, 2001.10.17487/rfc3174]Search in Google Scholar
[[6] Grobler T. L., Penzhorn W. T., Fast decryption methods for rsa cryptosystem, In 7th AFRICON Conference in Africa,1, 2004,361-364.]Search in Google Scholar
[[7] Huang Q., Cukier J., Kobayashi H., Liu B., Zhang J., Fast authenticated key establishment protocols for self-organizing sensor networks, Mitsubishi Electric Research Laboratories,2004.10.1145/941350.941371]Search in Google Scholar
[[8] Lamport L., Password authentication with insecure communication. Communications of ACM, 24,11,1981,770-772.10.1145/358790.358797]Search in Google Scholar
[[9] Nekkanti R.K., Lee C.W., Trust based adaptive on demand ad hoc routing protocol. In: Proceedings Of The 42nd Annual Southeast Regional Conference, 2004, 88-93.10.1145/986537.986558]Search in Google Scholar
[[10] Rivest R.L., Shamir A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems, Communications of ACM, 21,2, 1978, 120-126.10.1145/359340.359342]Search in Google Scholar
[[11] Saha H.N., Bhattacharyya D., Banerjee B., Mukherjee S., Singh R. and Ghosh D., Self-Organized key management based on fidelity relationship list and dynamic path. International Journal of Application or Innovation in Engineering & Management (IJAIEM),3,7,2014,97-100.]Search in Google Scholar
[[12] Saha H.N, Bhattacharyya D., Banerjee B., Mukherjee S., Singh R., Ghosh D., A review on attacks and secure routing protocols in MANET, In CIBTech, International Journal of Innovative Research and Review (JIRR), 1, 2, 2013,12-31.]Search in Google Scholar
[[13] Saha H N., Bhattacharyya D., Banerjee P K., Fidelity based on demand secure (FBOD) routing in mobile adhoc network, International Journal of Advanced Computer Science and Applications,Special Issue on Wireless & Mobile Networks(IJACSA), 2011,26-34.]Search in Google Scholar
[[14] Sanzgiri K., Dahill B., Levine B., Belding-Royer E., A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE International Conference on Network Protocols (ICNP), 2002,78-87.]Search in Google Scholar
[[15] Zapata M., Asokan N., Securing ad hoc routing protocols. In: Proceedings of the ACM Workshop on Wireless Security (WiSe), 2002,1-10.10.1145/570681.570682]Search in Google Scholar
[[16] Zeng, X., Bagrodia. R., Gerla M., GloMoSim: a library for parallel simulation of large-scale wireless networks, In Proc. of 12th Workshop on Parallel and Distributed Simulation (PADS),1998,154 - 161. 10.1145/278009.278027]Search in Google Scholar