共 21 条
- [1] Alem Y.F., Xuan Z.C., Preventing black hole attack in mobile ad-hoc networks using anomaly detection, Proceedings of the 2nd International Conference on Future Computer and Communication (ICFCC), 3, pp. 672-676, (2010)
- [2] Basile C., Kalbarczyk Z., Iyer R.K., Inner-circle consistency for wireless ad hoc networks, IEEE Transactions on Mobile Computing, 6, 1, pp. 39-55, (2007)
- [3] Clausen T.H., Hansen G., Christensen L., Behrmann G., The optimized link state routing protocol, evaluation through experiments and simulation, Proceedings of IEEE Symposium on Wireless Personal Mobile Communications, (2001)
- [4] Das S.R., Perkins C.E., Royer E.M., Performance comparison of two on-demand routing protocols for ad hoc networks, Personal Communications, 8, 1, pp. 16-28, (2001)
- [5] Deng H., Li W., Agrawal D.P., Routing security in wireless ad hoc networks, IEEE Communications Magazine, 40, 10, pp. 70-75, (2002)
- [6] Garcia-Teodoro P., Aschenbruck N., A novel collaborative approach for sinkhole detection in MANETs, Ad-hoc Networks and Wireless: ADHOC-NOW 2014 International Workshops, ETSD, MARSS, MWaoN, SecAN, SSPA, and WiSARN, (2014)
- [7] Hongsong C., Zhenzhou J., Mingzeng H., Zhongchuan F., Ruixiang J., Design and performance evaluation of a multi-agent-based dynamic life time security scheme for AODV routing protocol, Journal of Network and Computer Applications, 30, 1, pp. 145-166, (2007)
- [8] Iwata A., Chiang C.C., Pei G., Gerla M., Chen T.W., Scalable routing strategies for ad hoc wireless networks, IEEE Journal on Selected Areas in Communications, 17, 8, pp. 1369-1379, (1999)
- [9] Jebadurai J., Melvin A., Jebadurai I., Sinkhole detection in mobile ad-hoc networks using mutual understanding among nodes, Proceedings of the 3rd International Conference on Electronics Computer Technology (ICECT), 3, pp. 321-324, (2011)
- [10] Jhonson D.B., Maltz D.A., Dynamic source routing in ad hoc wireless networks, Mobile Computing, 353, pp. 153-181, (1996)