共 22 条
[1]
Cordasco J.(2008)Cryptographic vs. trust-based methods for manet routing security Electronic Notes in Theoretical Computer Science 197 131-140
[2]
Wetzel S.(2010)An end-to-end approach to secure routing in manets Wiley’s Security and Communication Networks Journal; Special Issue on Security in Mobile Wireless Networks 3 130-149
[3]
Dabideen S(2002)Routing security in ad hoc networks IEEE Communications Magazine. Special Topics on Security in Telecommunications Networks 40 70-75
[4]
Smith BR(2010)Computationally secure self-healing key distribution with revocation in wireless ad hoc networks Ad Hoc Networks 8 597-613
[5]
Garcia-Luna-Aceves JJ(2003)Sead: Secure and efficient distance vector routing for mobile wireless ad hoc networks Ad Hoc Networks 1 175-192
[6]
Deng H(2005)Ariadne: A secure on-demand routing protocol for ad hoc networks Wireless Networks 11 21-38
[7]
Li W(2006)Wormhole attacks in wireless networks IEEE Journal on Selected Areas in Communications 24 370-380
[8]
Agrawal DP(2006)Stationary distributions for the random waypoint mobility model IEEE Transactions on Mobile Computing 3 1153-1166
[9]
Dutta R(undefined)undefined undefined undefined undefined-undefined
[10]
Mukhopadhyay S(undefined)undefined undefined undefined undefined-undefined