[1] N. P. Reid, R. Seide, Wi-Fi (802.11) Network Handbook:
Osborne/McGraw-Hill, 2002.
[2] A. Perrig, J. D. Tygar, Secure Broadcast Communication in
Wired and Wireless Networks: Springer, 2003. BİLİŞİM TEKNOLOJİLERİ DERGİSİ, CİLT: 1, SAYI: 3, EYLÜL 2008 13
[3] N. Abramson, “Development of the Alohanet,” Ieee Transactions
on Information Theory, vol. 31, no. 2, pp. 119-123, 1985.
[4] B. P. Crow, I. Widjaja, J. G. Kimvd., “IEEE 802.11 wireless local
area networks,” Ieee Communications Magazine, vol. 35, no. 9,
pp. 116-126, Sep, 1997.
[5] M. S. Kuran, T. Tugcu, “A survey on emerging broadband
wireless access technologies,” Computer Networks, vol. 51, no.
11, pp. 3013-3046, Aug 8, 2007.
[6] K. Cleary, “Internet via MMDS”, International Broadcasting
Convention, pp. 79-82, 1997.
[7] A. Nordbotten, “LMDS systems and their application,”
Communications Magazine, IEEE, vol. 38, no. 6, pp. 150-154,
2000.
[8] B. Fong, N. Ansari, A. C. M. Fongvd., “On the scalability of fixed
broadband wireless access network deployment,”
Communications Magazine, IEEE, vol. 42, no. 9, pp. S12-S18,
2004.
[9] “IEEE Standard for Local and Metropolitan Area Networks Part
16: Air Interface for Fixed Broadband Wireless Access Systems,”
IEEE Std 802.16-2004 (Revision of IEEE Std 802.16-2001), pp.
1-857, 2004.
[10] M. Cao, W. C. Ma, Q. Zhangvd., “Analysis of IEEE 802.16 mesh
mode scheduler performance,” Ieee Transactions on Wireless
Communications, vol. 6, no. 4, pp. 1455-1464, Apr, 2007.
[11] “IEEE Standards for Local and metropolitan area networks - Part
16: Air Interface for Fixed and Mobile Broadband Wireless
Access Systems - Amendment 3: Management Plane Procedure
and Services,” IEEE Std 802.16g 2007 (Amendment to IEEE Std
802.16-2004), pp. 1-202, 2007.
[12] “IEEE Standard for Local and metropolitan area networks Part
16: Air Interface for Fixed and Mobile Broadband Wireless
Access Systems Amendment 2: Physical and Medium Access
Control Layers for Combined Fixed and Mobile Operation in
Licensed Bands and Corrigendum 1,” IEEE Std 802.16e-2005 and
IEEE Std 802.16-2004/Cor 1-2005 (Amendment and
Corrigendum to IEEE Std 802.16-2004), pp. 1-822, 2006.
[13] “IEEE Standard for Local and metropolitan area networks Part
16: Air Interface for Fixed Broadband Wireless Access Systems-
Amendment 1: Management Information Base,” IEEE Std
802.16f-2005 (Amendment to IEEE Std 802.16-2004), pp. 1-245,
2005.
[14] “IEEE Standard for Local and Metropolitan Area Networks
Media Access Control (MAC) Bridges Amendment 5: Bridging
of IEEE 802.16,” 802.16k-2007 (Amendment to IEEE Std
802.1D-2004), pp. 1-14, 2007.
[15] W. Bolton, X. Yang, M. Guizani, “IEEE 802.20: mobile
broadband wireless access,” Wireless Communications, IEEE [see
also IEEE Personal Communications], vol. 14, no. 1, pp. 84-95,
2007.
[16] “IEEE Draft Standard for Local and Metropolitan Area Networks
- Standard Air Interface for Mobile Broadband Wireless Access
Systems Supporting Vehicular Mobility - Physical and Media
Access Control Layer Specification,” IEEE Unapproved Draft Std
802.20/D4.1m, 2008.
[17] E. Cole, R. Krutz, J. W. Conley, Network Security Bible: Wiley
Pub., 2005.
[18] H. Li, Z. Chen, X. Qinvd., “Secure routing in wired networks and
wireless ad hoc networks,” Technical Report, 2002.
[19] D. B. Johnson, D. A. Maltz, “Dynamic Source Routing in Ad Hoc
Wireless Networks,” Mobile Computing, 1996.
[20] Y.-C. Hu, D. B. Johnson, A. Perrig, “SEAD: secure efficient
distance vector routing for mobile wireless ad hoc networks,” Ad
Hoc Networks, vol. 1, no. 1, pp. 175-192, 2003.
[21] E. P. Charles, B. Pravin, “Highly dynamic Destination-Sequenced
Distance-Vector routing (DSDV) for mobile computers,”
SIGCOMM Comput. Commun. Rev., vol. 24, no. 4, pp. 234-244,
1994.
[22] Y. C. Hu, A. Perrig, D. B. Johnson, “Ariadne: A secure ondemand routing protocol for ad hoc networks,” Wireless
Networks, vol. 11, no. 1-2, pp. 21-38, Jan-Mar, 2005.
[23] A. Perrig, R. Canetti, D. Tygarvd., “The TESLA Broadcast
Authentication Protocol,” vol. 5, no. 2, pp. 2-13, 2002.
[24] Y. C. Hu, A. Perrig, D. B. Johnson, “Wormhole detection in
wireless ad hoc networks,” Department of Computer Science,
Rice University, Tech. Rep. TR01-384, June, 2002.
[25] Y. Seung, N. Prasad, K. Robin, “Security-aware ad hoc routing
for wireless networks”, Proceedings of the 2nd ACM
international symposium on Mobile ad hoc networking and
computing, Long Beach, CA, USA, 2001,
[26] C. E. Perkins, E. M. Royer, “Ad-hoc on-demand distance vector
routing”, Mobile Computing Systems and Applications, 1999.
Proceedings. WMCSA '99. Second IEEE Workshop on, pp.
90-100, 1999.
[27] P. Papadimitratos, Z. J. Haas, “Secure routing for mobile ad hoc
networks”, SCS Communication Networks and Distributed
Systems Modeling and Simulation Conference (CNDS 2002),
pp. 01.27-31, 2002.
[28] K. Sanzgiri, B. Dahill, B. N. Levinevd., “A secure routing
protocol for ad hoc networks”, Network Protocols, 2002.
Proceedings. 10th IEEE International Conference on, pp. 78-
87, 2002.
[29] M. G. Zapata, N. Asokan, “Securing ad hoc routing protocols”,
3rd ACM workshop on Wireless security, pp. 1-10, 2002.
[30] P. Papadimitratos, Z. J. Haas, “Secure Link State Routing for
Mobile Ad Hoc Networks”, 2003 International Symposium on
Applications and the Internet, pp., 2003.
[31] J. Nie, J. Wen, J. Luovd., “An adaptive fuzzy logic based secure
routing protocol in mobile ad hoc networks,” Fuzzy Sets and
Systems, vol. 157, no. 12, pp. 1704-1712, 2006.
Thank you for copying data from http://www.arastirmax.com