References
- 권혜연, 신재욱, 이병복, 최지혁, 남상우 '이동 Ad-Hoc 네트워크 서비스,' 전자통신동향분석, 제 18권, 제4호, pp.23-35, 2003년 8월
- P.Papadimitratos, Z.J.Haas, and P. Samar 'The Secure Routing Protocol (SRP) for Ad Hoc Networks,' Internet Draft, December 2002
- Yih-Chun Hu and Adrian Perrig 'A Survey of Secure Wireless Ad Hoc Routing,' IEEE Security & Privacy, pp.28-39, May/June 2004
- S.Gupte and M.Singhal 'Secure Routing in Mobile Wireless Ad Hoc Networks,' Elsevier, Ad Hoc Networks, pp.151-174, 2003
- S.Marti et al. 'Mitigating Routing Misbehaviour in Mobil Ad Hoc Networks,' MOBICOM 2000, ACM Press, pp.255- 265, 2000
- Y.C. Hu, A.Perrig, and D.B.Johnson, 'Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,' MOBICOM 2002, ACM Press, pp.12-23, 2002
- A.Perrig, R. Canetti, and B. Whillock 'TESLA: Multicast Source Authentication Transform Specification,' IETF Internet Draft, October 2002
- C. E. Perkins and E. M. Royer, 'Ad hoc On-Demand Distance Vector Routing,' Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, pp.90-100, February 1999
- K. Sanzgiri et al,'A Secure Routing Protocol for Ad Hoc Networks,' ICNP 2002, IEEE Press, pp.78-87, 2002
- M. G. Zapata and N. Asokan 'Securing Ad Hoc Routing Protocols,' WISE 2002, ACM Press, pp.1-10, 2002