An approach to Handle Man in Middle Attack in Cluster based Architecture

[1]  Dipak Ghosal,et al.  Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges , 2003, MASCOTS Tutorials.

[2]  L. Qian,et al.  Secure Anonymous Routing in Clustered Multihop Wireless Ad Hoc Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[3]  V. G Rani,et al.  Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad Hoc Networks , 2010 .

[4]  Hongming Yang,et al.  A Novel QoS Multipath Path Routing in MANET , 2010, J. Digit. Content Technol. its Appl..

[5]  Kalpana Sharma,et al.  A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks , 2010 .

[6]  Elisavet Konstantinou Cluster-based Group Key Agreement for Wireless Ad hoc Networks , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[7]  J. Chandra,et al.  A cluster based security model for mobile ad hoc networks , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..

[8]  Ejaz Ahmed,et al.  Cluster-based Intrusion Detection (CBID) architecture for mobile ad hoc networks , 2006 .

[9]  Der-Jiunn Deng,et al.  Cluster-based secure communication mechanism in wireless ad hoc networks , 2010, IET Inf. Secur..