共 18 条
[1]
Bai F., Sadagopan N., Helmy A., Important: A framework to systematically analyze the impact of mobility on performance of routing protocols for ad hoc networks, Ieee Infocom, (2003)
[2]
Hu Y., Perrig A., A Survey of Secure Wireless Ad Hoc Routing, Ieee Security & Privacy, pp. 28-39, (2004)
[3]
Sanzgiri K., Et al., A Secure Routing Protocol for Ad Hoc Networks, Ieee Int'l Conf. Network Protocols (icnp'02), pp. 78-87, (2002)
[4]
Guerrero Z.M., Asokan N., Securing Ad Hoc Routing Protocols, pp. 1-10, (2002)
[5]
Yi S., Naldurg P., Kravets R., Security aware ad-hoc routing for wireless networks, Acm International Symposium On Mobile Ad Hoc Networking and Computing (mobihoc'01), pp. 299-302, (2001)
[6]
Perrig A., Hu Y.C., Johnson D.B., Wormhole Protection In Wireless Ad-hoc Networks, (2001)
[7]
Hu Y.-C., Perrig A., Johnson D.B., Rushing attacks and defense in wireless Ad-Hoc network routing protocols, Proceedings of The 2003 Acm Workshop On Wireless Security, pp. 30-40, (2003)
[8]
The Network Simulator, (1989)
[9]
Johnson D.B., Maltz D.A., Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, pp. 152-181, (1996)
[10]
Hu Y.-C., Johnson D.B., Perrig A., Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks, The 4th Ieee Wksp. Mobile Computing Systems and Applications (wmcsa'02), (2002)