Cite this paper
nullA. Kathirvel and R. Srinivasan, "Self Umpiring System for Security in Wireless Mobile Ad Hoc Network," Wireless Sensor Network
, Vol. 2 No. 3, 2010, pp. 264-266. doi: 10.4236/wsn.2010.23036
 S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, USA, pp. 255–265, 6-11 August, 2000.
H. Yang, J. Shu, X. Meng and S. Lu, “SCAN: Self-organized network-layer security in Mobile ad hoc networks,” IEEE Journals on Selected Areas in Communications, Vol. 24, No. 2, February 2006.
3. Scalable Networks Technologies: QualNet simulator 4.5, http://www.scalable-networks.com/
IEEE 802.11g. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, August, 1999.
M. A. Azer, S. M. El-Kassas, and M. S. El-Soudani, “Certification and revocation schemes in ad hoc networks survey and challenges,” Proceeding of IEEE International Conference on Systems and Networks Communications, 2007.
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for MANET,” Proceeding of International Conference on Network Protocols, pp. 251–260, 2001.
N. Nasser and Y. Chen, “Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks,” Proceeding of International Conference on Communications, pp. 1154–1159, 2007.