Security Threats and Maintaince in Mobile Adhoc Networks
暂无分享,去创建一个
[1] Zygmunt J. Haas,et al. The performance of query control schemes for the zone routing protocol , 1998, SIGCOMM '98.
[2] Wayne E. Stark,et al. Frequency-hopped spread spectrum in the presence of a follower partial-band jammer , 1993, IEEE Trans. Commun..
[3] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[4] Richard G. Ogier,et al. A reliable, efficient topology broadcast protocol for dynamic networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[5] Thomas Clausen,et al. The Optimized Link State Routing Protocol: Evaluation through Experiments and Simulation , 2001 .
[6] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[7] Zygmunt J. Haas,et al. ZRP: a hybrid framework for routing in Ad Hoc networks , 2001 .