Handbook of ad hoc wireless networks, chapter Securing mobile ad hoc networks, 2002. ,
Fundamentals of mobile and pervasive computing, 2005. ,
A survey of security issues in mobile ad hoc and sensor networks, IEEE Communications surveys & tutorials, vol.7, issue.4, pp.2-28, 2005. ,
Ad hoc networking: an introduction, 2001. ,
Securing ad hoc networks, IEEE network, vol.13, issue.6, pp.24-30, 1999. ,
The sybil attack, Proceedings of the international workshop on peer-to-peer systems (IPTPS), 2002. ,
Ad hoc network security: challenges and solutions, 2004. ,
Wireless/mobile network security, chapter A survey on attacks and countermeasures in mobile ad hoc networks, 2006. ,
Secure routing for mobile ad hoc networks, IEEE Communications surveys & tutorials, vol.7, issue.3, pp.2-21, 2005. ,
DICAS: detection, diagnosis and isolation of control attacks in sensor networks, Proceedings of the international conference on security and privacy in communication networks (SECURECOMM), pp.89-100, 2005. ,
Survivable network systems: an emerging discipline (cmu/sei-97-tr-013), 1997. ,
Intrusion-tolerant architectures: concepts and design, 2003. ,
Fault and intrusion tolerance in wireless ad hoc networks, Proceedings of IEEE wireless communications and networking conference (WCNC), vol.4, pp.2281-2286, 2005. ,
Internet security: an intrusion-tolerance approach, Proceedings of the IEEE, vol.94, issue.2, pp.432-441, 2006. ,
, Malicious-and accidental-fault tolerance for internet applications, 2006.
, Organically assured and survivable information system (OASIS), 2006.
Survivable mobile wireless networks: issues, challenges, and research directions, Proceedings of ACM workshop on wireless security (WiSe), pp.31-40, 2002. ,
Basic concepts and taxonomy of dependable and secure computing, IEEE transaction dependable security computer, vol.1, issue.1, pp.11-33, 2004. ,
Intrusion tolerance: concepts and design principles, 2002. ,
A fault-and intrusion-tolerant file system, Proceedings of the international conference on computer security, pp.203-218, 1985. ,
Dependability: basic concepts and terminology in English, French, German, Italian, and Japanese (Dependable computing and faulttolerant systems), 1991. ,
Dependability and its threats -a taxonomy, IFIP congress topical sessions, pp.91-120, 2004. ,
Mitigating byzantine attacks in ad hoc wireless networks, 2004. ,
Ad-hoc on-demand distance vector routing, Proceedings of IEEE workshop on mobile computing systems and applications (WMCSA), p.90, 1999. ,
DSR -the dynamic source routing protocol for multihop wireless ad hoc networks, pp.139-172, 2001. ,
The TESLA broadcast authentication protocol, RSA CryptoBytes, vol.5, issue.2, 2002. ,
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, Ad hoc networks, vol.1, pp.175-192, 2003. ,
Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless networks, vol.11, pp.21-38, 2005. ,
HMAC: Keyed-hashing for message authentication. RFC 2104, Internet Engineering Task Force, 1997. ,
Secure routing for mobile ad hoc networks, Proceeding of communication networks and distributed systems modeling and simulation (CNDS), 2002. ,
Secure multipath routing for mobile ad hoc networks, Proceedings of the conference on wireless ondemand network systems and services (WONS), pp.89-96, 2005. ,
Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the international conference on mobile computing and networking (MobiCom), pp.255-265, 2000. ,
Resisting malicious packet dropping in wireless ad hoc networks, Proceedings of the international conference on AD-HOC networks & wireless (ADHOC-NOW), pp.151-163, 2003. ,
Global Positioning System: Theory and Practice, 2001. ,
Packet leashes: a defense against wormhole attacks in wireless networks, Proceedings of the IEEE computer and communications societies (INFOCOM), vol.3, pp.1976-1986, 2003. ,
Using directional antennas to prevent wormhole attacks, Proceedings of the network and distributed system security symposium (NDSS), pp.89-96, 2004. ,
Requirements definition for survivable network systems, Proceedings of the international conference on requirements engineering (ICRE), pp.0-14, 1998. ,
Wireless/mobile network security, chapter A survey on intrusion detection in mobile ad hoc networks, 2006. ,
Intrusion detection in wireless ad hoc networks, vol.11, pp.48-60, 2004. ,
Bootstrapping security associations for routing in mobile ad-hoc networks, Proceedings of the global telecommunications conference (GLOBECOM), vol.3, pp.1511-1515, 2003. ,
Secure ad hoc on-demand distance vector routing, ACM SIGMOBILE Mobile Computing and Communications Review, vol.6, pp.106-107, 2002. ,
Security-aware ad hoc routing for wireless networks, Proceedings of the ACM international symposium on mobile ad hoc networking & computing (MobiHoc), pp.299-302, 2001. ,
Techniques for intrusion-resistant ad hoc routing algorithms TIARA, DARPA information survivability conference and exposition (DISCEX), vol.02, pp.98-100, 2003. ,
Providing fault-tolerant ad hoc routing service in adversarial environments. Wireless personal communications: an international journal, vol.29, pp.367-388, 2004. ,
On the survivability of routing protocols in ad hoc wireless networks, Proceedings of the international conference on security and privacy in communication networks (SECURECOMM), pp.327-338, 2005. ,
Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile network application, vol.8, pp.579-592, 2003. ,
Friends and foes: preventing selfishness in open mobile ad hoc networks, Proceedings of international conference on distributed computing systems workshops (ICDCSW), vol.00, p.440, 2003. ,
SPRITE: a simple, cheat-proof, credit-based system for mobile ad-hoc networks, Proceedings of the IEEE computer and communications societies (INFOCOM), vol.3, pp.1987-1997, 2003. ,
CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security, pp.107-121, 2002. ,
Performance analysis of the CONFIDANT protocol: cooperation of nodes -fairness in dynamic ad-hoc networks, Proceedings of IEEE/ACM symposium on mobile ad hoc networking and computing (MobiHoc), 2002. ,
SPREAD: enhancing data confidentiality in mobile ad hoc networks, Proceedings of the IEEE computer and communications societies (INFOCOM), 2004. ,
Secure data transmission in mobile ad hoc networks, Proceedings of the 2003 ACM workshop on wireless security (WiSe), pp.41-50, 2003. ,
On designing MAC protocols for wireless networks using directional antennas, IEEE transactions on mobile computing, vol.5, issue.5, pp.477-491, 2006. ,
Data security in MANETs using multipath routing and directional transmission, Proceedings of IEEE international conference on communications (ICC), vol.5, pp.2322-2328, 2006. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
Internet security association and key management protocol (ISAKMP). RFC 2408, Internet Engineering Task Force, 1998. ,
Efficient dispersal of information for security, load balancing, and fault tolerance, Journal ACM, vol.36, issue.2, pp.335-348, 1989. ,
Diversity coding for transparent self-healing and fault-tolerant communication networks, IEEE Transactions on Communications, vol.41, issue.11, pp.1677-1686, 1993. ,
Self-organized public-key management for mobile ad hoc networks, IEEE transactions on mobile computing, vol.2, issue.1, pp.52-64, 2003. ,
The official PGP user's guide, 1995. ,
Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: an analysis, EURASIP Journal on Wireless Communications and Networking, issue.4, pp.579-589, 2005. ,
Cryptography and network security -fourth edition, 2006. ,
MOCA: Mobile certificate authority for wireless ad hoc networks, Proceedings of the PKI research workshop (PKI), 2003. ,
, She has worked at security area for many years, her interest domain is security, wireless network, 2004.
, he was an invited researcher at, Aldri received both his M.Sc. and B.Sc in Informatics from Federal University of, 2001.
, He is currently Professor at the University Pierre et Marie Curie and member of the Scientific Advisory Board of the France Telecom Group, 1975.