[1] A. Yaar, A. Perrig and D. Song StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing
defense, IEEE J. Sel. Areas Commun. 24(10) (2006) 1853–1863.
[2] S. Agarwal, R.H. Katz, S.V. Krishnamurthy and S.K. Dao, Distributed power control in ad-hoc wireless networks,
12th IEEE Int. Symp. Personal, Indoor and Mobile Radio Commun. 2001.
[3] K. Biswas and Md. Liakat Ali; Security Threats in Mobile Ad Hoc Network, Master Thesis Computer Science,
2007.
[4] Y. Chaba, Y. Singh and A. Preeti, Performance analysis of disable IP broadcast technique for prevention of
flooding-based DDoS attack in MANET, J. Networks 4(3) (2009) 178–183.[5] J. Chang and L. Tassiulas, Energy conserving routing in wireless ad-hoc networks, Proc. IEEE INFOCOM 2000,
Conf. Comput. Commun. Nineteenth Annual Joint Conf. IEEE Comput. Commun. Soc. 2000.
[6] S. Chen, Y. Tang and W. Du, Stateful DDoS attacks and targeted filtering, J. Netw. Comput. Appl. 30(3) (2007)
823–840.
[7] X. Geng and A. Whinston, Defeating distributed denial of service attacks, IT Prof. 2(4) (2000) 36–42.
[8] Huang et al, A cooperative intrusion detection system for Ad Hoc networks, Proc. ACM Workshop Secur. Ad Hoc
Sensor Networks, Fairfax VA. (2003) 135–147.
[9] M. Just, E. Kranakis and T. Wan, Resisting malicious packet dropping in wireless Ad-Hoc networks, Proc. 2nd
Annual Conf. Adhoc Networks and Wireless (AD-HOCNOW’03), Montreal, Canada, 2003 pp. 151–163.
[10] V. Kawadia and P.R. Kumar, Power control and clustering in ad hoc networks, Twenty-second Annual Joint
Conf. IEEE Comput. Commun. Soc. (IEEE Cat. No.03CH37428), 2003.
[11] R. Kravets and P. Krishnan, Power management techniques for mobile communication, Int. Conf. Mobile Comput.
Network. USA, 1998, pp. 157–183.
[12] V. Krpijoki, Security in Ad Hoc networks, IFIP Int. Conf. Personal Wireless Commun. 2003, pp. 756–775.
[13] M. Kumar and N. Kumar, Study of attack prevention methods for DDOS attacks in manets, Int. J. Adv. Res.
Comput. Sci. Eng. Inf. Technol. 2(8) (2012) 224–228.
[14] S. Lim, Ch. Yu and R. Das, Random cast: An energy efficient communication scheme for mobile ad hoc networks,
IEEE Trans. Mobile Comput. 8(8) (2009) 1039–1051.
[15] P. Magula and M. Kotocova, Quality of service models for mobile Ad-hoc networks, Proc. 12th Int. Conf. Comput.
Syst. Technol., Vienna, Austria, 2011.
[16] S. Khan, K.-K. Loo, T. Naeem and M. Abrar Khan, Denial of service attacks and challenges in broadband wireless
networks, Int. J. Netw. Secur. 8(7) (2008) 1–6.
[17] S. Singh, M. Woo and C.S. Raghavendra, Power-aware routing in mobile Ad Hoc networks, Proc. 4th Annual
ACM/IEEE, Int. Conf. Mobile Comput. Network., USA, 1998, pp. 181–190.
[18] V.A. Siris and I Stavrakis, Provider-based deterministic packet marking against distributed DoS attacks, J. Netw.
Comput. Appl. 30(3) (2007) 858–876.
[19] S.M. Specht and R.B. Lee, Distributed denial of service: taxonomies of attacks, tools, and countermeasures, Proc.
17th Int. Conf. Paral. Distrib. Comput. Syst. 2004 Int. Workshop Secur. Paral. Distrib. Syst. 2004, pp. 543–550.
[20] K. Woo, Ch. Yu, D. Lee, H. Yong Youn and B. Lee, Non-blocking, localized routing algorithm for balanced energy
consumption in mobile ad hoc networks, Proc. Ninth Int. Symp. Model. Anal. Simul. Comput. Telecommun. Syst.
2001.
[21] B. Xiao, W. Chen and Y. He, A novel approach to detecting DDoS attacks at an early stage, J. Supercomput.
36(3) (2006) 235–248.
[22] Z. YaztiDemetrios, A Glance at Quality of Services in Mobile Ad-Hoc Networks, Technical Report. 2001.
[23] X. Zeng, R. Bagrodia, M. Gerla, Glomosim: A library for parallel simulation of large-scale wireless networks,
ACM SIGSIM Simul. Digest. 28(1) (1998) 154–161.
[24] X. Zhou, C.Z. Xu, Distributed denial-of-service and intrusion detection, J. Netw. Comput. Appl. 30(3) (2007)
819–822.