References
- C-K Toh, 'Ad hoc Mobile Wireless Networks', Prentice Hall PTR 2002
- Levente Buttyan, Jean-Pierre Hubaux, 'Report on a working session on security in wireless Ad hoc networks', ACM SIGMOBILE Mobile Computing and Communications Review, Volume 7 Issue 1, January 2003
- Soonjwa Hong, Seung Hyong Rhee, Jae-Cheol Ryou, 'Simulation-Based Analysis of DoS Attacks in Wireless Ad hoc Networks', IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, Vol.E87-D No. 10 pp. 2415-2418, October 2004
- A. Wood and J. Stankovic, 'Denial of service in sensor networks,' IEEE Computer, pp. 48-56, Oct. 2002
- P. Michiardi and R. Molva, 'Simulation- based analysis of security exposures in mobile Ad hoc networks,' European Wireless Conference, Feb. 2002
- P. Kyasanur and N. Vaidya, 'Diagnosing and penalizing MAC layer misbehavior in wireless networks,' Technical Report, Dept. of ECE, UIUC, Dec. 2002
- The CMU Monarch project's wireless and mobility extensions to ns, Snapshot Release 1.1.1, Carnegie mellon University, Aug. 1999
- HyoJun Lim, Chong-kwon Kim, 'Flooding in Wireless Ad hoc Networks', Computer Communications, Vol. 24, February 2001
- Manel, G.Z., 'Secure Ad hoc Ondemand Distance Vector Routing', IETF internet Draft draft-guerrero- manet-saodv-00.txt (work in progress), 2001
- Yih-Chun Hu, Adrian Perrig, David B. Johnson, 'Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks', In Proceedings of the 8th annual international conference on Mobile computing and networking, pp. 12-23.ACM Press, 2002
- Y.-C. Hu, D. B. Johnson, and A. Perrig. 'Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks', In Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications, page 3, 2002
- U. Lu, B.; Pooch. 'Cooperative security-enforcement routing in mobile ad hoc networks', Mobile and Wireless Communications Network, 2002
- Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 275-283, ACM Press, 2000
- C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasit-tiporn, J. Rowe, and K. Levitt. 'A specificationbased intrusion detection system for aodv', In Proceedings of the 1st ACM workshop on Security of Ad hoc and sensor networks, pp. 125-134, ACM Press, 2003
- Amin Vahdat, Alvin Lebeck, Carla Schlatter Ellis, 'Every joule is precious: the case for revisiting operating system design for energy efficiency', Proceedings of the 9th workshop on ACM SIGOPS European workshop, September 2000
- Sung Park, Mani B. Srivastava, 'Dynamic battery state aware approaches for improving battery utilization', Proceedings of the 2002 international conference on Compilers, architecture, and synthesis for embedded systems, October 2002
- Mathias Bohge, Wade Trappe, 'An authentication framework for hierarchical ad hoc sensor networks', Proceedings of the 2003 ACM workshop on Wireless security, September 2003
- Andre Weimerskirch, Dirk Westhoff, 'Identity certified authentication for ad-hoc networks, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, October 2003
- He Huang, Shyhtsun Felix Wu, 'An approach to certificate path discovery in mobile Ad Hoc networks', Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, October 2003
- Jim Binkley, William Trost, 'Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems', Wireless Networks 7, pp. 139-145, 2001 https://doi.org/10.1023/A:1016633521987
- Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, 'Random keyassignment for secure Wireless Sensor Networks', Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, October 2003
- D. B. Johnson, D. A. Maltz, and Yih-Chun Hu, 'The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks(DSR)', IETF MANET Working Group Internet draft, July 2004
- 박용우, '블루투스 기술발전에 따른 국내기업 의 대응전략', 정보통신정책, 제13권 14호 통권283호, pp. 1-26, 2002년 8월