참고문헌
- P. Michiardi, and R. Molva, "Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks", European Wireless Conference, 2002.
- Panagiotis Papadimitratos, and Zygmunt J. Hass, "Secure Routing for Mobile Ad Hoc Networks", in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference(CNDS 2002), San Antonio, TX, Jan. 2002.
- Y. Hu, A. Perring, and D. Johnson, "Ariadne : A Secure On-Demand Routing Protocol for Ad Hoc Network", in Proceedings of ACM MobiCom '02, 2002.
- G. Zapata, "Secure Ad Hoc On-Demand Distance Vector(SAODV) Routing", in IETF Draft, http://www.ietf.org/internet-draft/draft-guerrero-manet-saodv-00.txt, 2001.
- K. Sanzgiri, B. Dahill, B. Levine, and E. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks", in Proceedings of IEEE ICNP '02, 2002.
- F. Kargl, and A. Geiss, "Secure Dynamic Source Routing", in Proceedings of HICSS 38, 2005.
- Jaydip Sen, "A Survey on Reputation and Trust-Based Systems for Wireless Communication Networks", CoRR, 2010.
- C. K. Toh, C. Lee, and N. A. Ramos, "Next-Generation Tactical Ad Hoc Mobile Wireless Networks", in Technology Review Journal Spring, pp. 103-113, 2002.
- J. Brand, and G. Hart Wig, "Management of Tactical Ad Hoc Networks with C2 Data Models", Military Communication Conference 2001 IEEE, pp. 915-922, Aug. 2002.
- Y. Zhang, and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," in Mobile Computing and Networking, pp. 275-283, 2000.
- S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", in Proceeding of the 6th International Conference on Mobile Computing and Networking, pp. 255-265, Aug. 2000.
- S. Buchegger, J-Y. L. Boudec, "Nodes Bearing Grudges : Towards Routing Security, Fairness and Robustness in Mobile Ad Hoc Networks", in Euromicro Workshop on Parallel, Distributed amd Network-based Processing, pp. 403-410, Jan. 2002.
- S. Buchegger, and J. L. Boudec, "Performance Analysis of the CONFIDANT Protocol," in Proceeding of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 226-236, 2002.
- Chin-Yang Tseng, Poornima Balasubra-manyam, Calvin Ko, and Karl Levitt, "A Specification-Based Intrusion Detection Model for OLSR", LNCS 3858, pp. 330-350, 2006.
- Aikaterini Mitrokotsa, Rosa Mavropodi, and Christos Douligeris, "Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks", International Conference on Intelligent Systems and Computing : Theory and Applications, July, 2006.
- Oscar F. Gonzalez, Godwin Ansa, Michael Howarth, and George Pavlou, "Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-hoc Networks", Journal of Internet Engineering, Vol. 2, No. 1, June, 2008.
- Jaydip Sen, and Kaustav Goswami, "An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks", in Proceedings of the International Symposium on Intelligent Information Systems and Applications, pp. 571-576, Oct., 2009.
- C. E. Perkins, E. M. Royer, and S. R. Das., "Ad Hoc On-Demand Distance Vector(AODV) Routing", IETF, MANET Working Group, Oct. 1999.