共 18 条
- [1] Bai F., Sadagopan N., Helmy A., Important: A framework to systematically analyze the impact of mobility on performance of routing protocols for ad hoc networks, Ieee Infocom, (2003)
- [2] Hu Y., Perrig A., A Survey of Secure Wireless Ad Hoc Routing, Ieee Security & Privacy, pp. 28-39, (2004)
- [3] Sanzgiri K., Et al., A Secure Routing Protocol for Ad Hoc Networks, Ieee Int'l Conf. Network Protocols (icnp'02), pp. 78-87, (2002)
- [4] Guerrero Z.M., Asokan N., Securing Ad Hoc Routing Protocols, pp. 1-10, (2002)
- [5] Yi S., Naldurg P., Kravets R., Security aware ad-hoc routing for wireless networks, Acm International Symposium On Mobile Ad Hoc Networking and Computing (mobihoc'01), pp. 299-302, (2001)
- [6] Perrig A., Hu Y.C., Johnson D.B., Wormhole Protection In Wireless Ad-hoc Networks, (2001)
- [7] Hu Y.-C., Perrig A., Johnson D.B., Rushing attacks and defense in wireless Ad-Hoc network routing protocols, Proceedings of The 2003 Acm Workshop On Wireless Security, pp. 30-40, (2003)
- [8] The Network Simulator, (1989)
- [9] Johnson D.B., Maltz D.A., Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, pp. 152-181, (1996)
- [10] Hu Y.-C., Johnson D.B., Perrig A., Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks, The 4th Ieee Wksp. Mobile Computing Systems and Applications (wmcsa'02), (2002)