暂无分享,去创建一个
P. Samundiswary | Perumal Dananjayan | D. Sathian | S. P | Sathian D | D. P
[1] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[2] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[3] S. Carter. Secure Position Aided Ad Hoc Routing , 2003 .
[4] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[5] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[6] Chris McDonald,et al. Trusted Greedy Perimeter Stateless Routing , 2007, 2007 15th IEEE International Conference on Networks.
[7] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[8] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[9] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[10] Ian T. Downard,et al. Simulating Sensor Networks in NS-2 , 2004 .
[11] Alan D. Ross,et al. Network Security Essentials , 2003 .
[12] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.