参考文献
|
-
Perkins, E. Belding-Royer and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing”, IETF, RFC 3561, Jul. 2003.
-
Bala, M.,Bansal, J. Singh(2009).Performance Analysis of MANET under Blackhole Attack.Proceedings of the 2009 First International Conference on Networks & Communications-Netcom
-
Bhalaji, N.,Shanmugam, A.(2009).Association between nodes to Combat Blackhole attack in DSR based MANET.Proceedings of Sixth IEEE-IFIP International Conference on WOCN,Egypt:
-
Chen, Y. S.,Lin, Y. W.,Pan, C. Y.(2009).A Diagonal-Intersection-Based Routing Protocol for Urban Vehicular Ad Hoc Networks.Telecommunication System
-
Fonseca, E.,Festag, A.(2006).NEC Technical ReportNEC Technical Report,未出版
-
Hu, Y. C.,Perrig, A.,Johnson, D. B.(2002).Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks.Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom)
-
Ibrahim, M. M.,Sadek, N.,EI-Banna, M.(2009).Prevention of Flooding Attack in Wireless Ad-Hoc AODV-based networks using Real-time Host Intrusion Detection.Wireless and Optical Communications Networks (WOCN)
-
Imielinski, Tomasz(ed.),Korth, Henry F.(ed.)(1996).Mobile Computing.Kluwere Academic Publishers.
-
Jacquet, P.,Muhlethaler, P.,Clausen, T.,Laouiti, A.,Qayyum, A.,Viennot, L.(2001).Optimized Link State Routing Protocol.Proceedings of the IEEE International Multi Topic Conference, Technology for the 21st Century,France:
-
Lochert, M. Mauve,Fera, H.,Hartenstein, H.(2005).Geographic routing in city scenarios.ACMSIGMOBILE Mobile Computing and Communications,9(1),69-72.
-
Naumov, V.,Gross, T.(2007).Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks.IEEE International Conference on Computer Communications (INFOCOM)
-
Ning, P.,Sun, K.(2003).How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad hoc Routing Protocols.Proceedings of the 4th Annual IEEE Information Assurance Workshop
-
Perkins, E.,Royer, E. M.(1999).Ad hoc on-demand distance vector routing.Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99),New Orleans, La, USA:
-
Raya, M.,Hubaux, J. P.(2005).The security of vehicular ad hoc networks.Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
-
Raya, M.,Hubaux, J. P.(2005).Security aspects of inter-vehicle communications.Proceedings of 5th Swiss Transport Research Conference (STRC)
-
Raya, M.,Papadimitratos, P.,Hubaux, J. P.(2006).Securing vehicular communications.IEEE Wireless Communications Magazine,Oct
-
Sanzgiri, K.,Dahill, B.,Levine, B. N.,Belding-Royer, E.,Shields, C.(2002).A Secure Routing Protocol for Adhoc Networks.Proceedings of the 10 Conference on Network Protocols (ICNP)
-
Sun, W.,Yamaguchi, H.,Yukimasa, K.,Kusumoto, S.(2006).GVGrid: A QoS Routing Protocol for Vehicular Ad Hoc Networks.IEEE International Workshop on Quality of Service (IWQoS)
-
Taleb, T.,Sakhaee, E.,Jamalipour, A.,Hashimoto, K.,Kato, N.,Nemoto, Y.(2007).A Stable Routing Protocol to Support ITS Services in VANET Networks.IEEE Transactions on Vehicular Technology,56(6),337-347.
-
Tamilselvan, L.,Sankaranarayanan, V.(2007).Prevention of Blackhole Attack in MANET.Wireless Broadband and Ultra Wideband Communications, AusWireless
-
Yu, C. W.,Wu, T. K.,Cheng, R. H.,Yu, K. M.,Chang, S. C.(2009).A Distributed and Cooperative Algorithm for the Detection and Elimination of Multiple Black Hole Nodes in Ad Hoc Networks.IEICE Transactions on Communications,E92-B(2),483-490.
-
Zapata, M. G.(2002).Secure Ad hoc On-Demand Distance Vector Routing.Proceedings of Mobile Computing and Communications Review
-
Zhao, J.,Cao, G.(2006).VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks.Proceedings of the 25th Conference on Computer Communications (IEEE INFOCOM 2006),Barcelona, Spain:
|