暂无分享,去创建一个
[1] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[2] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[3] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[4] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[5] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[6] Erdal Cayirci,et al. Security in Wireless Ad Hoc and Sensor Networks , 2009 .
[7] Boon-Chong Seet,et al. The Handbook of Ad Hoc Wireless Networks , 2002 .
[8] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[9] Bohyung Han,et al. Robust routing in wireless ad hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.
[10] Bibhudatta Sahoo,et al. A MODIFIED ADAPTIVE-SAODV PROTOTYPE FOR PERFORMANCE ENHANCEMENT IN MANET , 2009 .
[11] J. Broch,et al. Dynamic source routing in ad hoc wireless networks , 1998 .
[12] Davide Cerri,et al. Securing AODV: the A-SAODV secure routing prototype , 2008, IEEE Communications Magazine.
[13] Xu Qiao-ping,et al. Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .
[14] Hitesh Tewari,et al. Real-time intrusion detection for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[15] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[16] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[17] Chunxiao Chigan,et al. Token Routing: A Power Efficient Method for Securing AODV Routing Protocol , 2006, 2006 IEEE International Conference on Networking, Sensing and Control.
[18] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[19] Wenke Lee,et al. Attack Analysis and Detection for Ad Hoc Routing Protocols , 2004, RAID.
[20] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[21] Janne Lundberg. Routing Security in Ad Hoc Networks , 2000 .
[22] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[23] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.