暂无分享,去创建一个
[1] Anis Laouiti,et al. Multipoint Relaying: An Efficient Technique for Flooding in Mobile Wireless Networks , 2000 .
[2] Bu-Sung Lee,et al. Security Threats in Ad Hoc Routing Protocols , 2009, Guide to Wireless Ad Hoc Networks.
[3] Cédric Adjih,et al. Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format , 2009, RFC.
[4] Futai Zou,et al. A Survey on Security in Wireless Mesh Networks , 2010 .
[5] Ulrich Herberg. Performance Evaluation of Using a Dynamic Shortest Path Algorithm in OLSRv2 , 2010, 2010 8th Annual Communication Networks and Services Research Conference.
[6] Philippe Jacquet,et al. Fish eye OLSR scaling properties , 2004, Journal of Communications and Networks.
[7] Thomas H. Clausen,et al. Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs) , 2009, RFC.
[8] Gregory A. Hansen,et al. The Optimized Link State Routing Protocol , 2003 .
[9] Brian Adamson,et al. Jitter Considerations in Mobile Ad Hoc Networks (MANETs) , 2008, RFC.
[10] Thomas Clausen,et al. The Optimized Link State Routing Protocol: Evaluation through Experiments and Simulation , 2001 .
[11] G. Pulla,et al. A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols , 2010 .
[12] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[13] Ulrich Herberg. Integrating Java Support for Routing Protocols in NS2 , 2008 .
[14] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[15] Christos Douligeris,et al. Security for Ad Hoc Networks , 2010, Handbook of Information and Communication Security.
[16] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[17] Laurent Viennot,et al. Complexity Results on Election of Multipoint Relays in Wireless Networks , 1998 .
[18] Xiaohu You,et al. The Jamming problem in IEEE 802.11‐based mobile ad hoc networks with hidden terminals: Performance analysis and enhancement , 2009, Int. J. Commun. Syst..
[19] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[20] Thomas H. Clausen,et al. Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP) , 2011, RFC.
[21] Mark Stamp,et al. Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.
[22] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[23] Nei Kato,et al. A study of a routing attack in OLSR-based mobile ad hoc networks , 2007, Int. J. Commun. Syst..
[24] 廖宏梓,et al. On the Elliptic Curve Digital Signature Algorithm , 2006 .
[25] C. Adjih,et al. Attacks Against OLSR : Distributed Key Management for Security , 2022 .
[26] Xiaohu You,et al. The Jamming problem in IEEE 802.11-based mobile ad hoc networks with hidden terminals: Performance analysis and enhancement , 2009 .
[27] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[28] Eric Allman,et al. Email Submission Operations: Access and Accountability Requirements , 2007, RFC.