共 14 条
- [1] A Survey of Secure Mobile Ad Hoc Routing Protocols [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (04): : 78 - 93
- [2] Al-Shurman M., 2004, Proceedings of the 42nd annual Southeast regional conference, P96
- [3] Bo Sun, 2003, 5th European Personal Mobile Communications Conference 2003 (IEE Conf. Publ. 492), P490, DOI 10.1049/cp:20030303
- [5] On the effect of node misbehavior in ad hoc networks [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 3759 - 3763
- [6] Hollick M, 2004, LECT NOTES COMPUT SC, V2957, P201
- [7] Karlof C, 2003, PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, P113, DOI 10.1109/snpa.2003.1203362
- [8] Kurosawa S., 2007, International Journal of Network Security, P338
- [9] Black Hole Attack Prevention Based on Authentication Mechanism [J]. 2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 173 - 177
- [10] Narendra K. S., 1989, Learning Automata: An Introduction