1 |
양환석, "MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구," 디지털산업정보학회지, 제9권, 제1호, 2013, pp.87-93.
|
2 |
P Narayan, V R. Syrotiuk, "valuation of the AODV and DSR Routing Protocols Using the MERIT Tool," In proceeding or ADHOC-NOW 2004, pp. 25-36.
|
3 |
Law, Y. W., Palaniswami, M., Hoesel, L. V., Doumen, J., Hartel, P. Havinga, P., "Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols," ACM Trans. Sens. Netw., 2009, Vol. 5, No. 1, pp. 1-38.
|
4 |
서두옥, 이동호, "DTMNs를 위한 방향성 정보와 최대 공동 이웃 노드에 기반한 효율적인 라우팅 프로토콜," 디지털산업정보학회지, 제6권, 제1호, 2010, pp.83-90.
|
5 |
Seyed Amin Hosseini Seno, Rahmat Budiarto and Tat-Chee Wan, "SHSDAP: Secure Hierarchical Service Discovery and Advertisement Protocol in Cluster Based Mobile Ad hoc Network," World Applied Sciences Journal, 2009, Vol. 7, pp. 115-128.
|
6 |
Jigar Doshi, Prahlad Kilambi, "AFAR:An Adaptive Bandwidth-Efficient Routing Protocol for Mobile Ad Hoc Networks," Proceeding of ADHOC-NOW 2003, springer 2003, pp. 12-24.
|
7 |
Yan L. Sun, Wei Yu, "nformation Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks," IEEE 2006, pp. 305-317.
|
8 |
Rajiv k. Nekkanti, Chung-wei Lee, "Trust Based Adaptive On Demand Ad Hoc Routing Protocol," ACMSE '4, April 2-3, 2004, ACM 2004, pp.88-93.
|
9 |
Ritu Sharma, Yogesh Chaba, Yudhvir Singh, "Analysis of Security Protocols in Wireless Sensor Network," International Journal Advanced Networking and Applications, 2010, Vol.02, Issue: 03, pp. 707-713.
|
10 |
L. Abusalah, A. Khokhar, "TARP : Trust-Aware Routing Protocol," IWCMC'6, July 3-6, 2006, ACM 2006, pp. 135-140.
|
11 |
K. Sanzgiri et al., "A Secure Routing Protocol for Ad Hoc Networks," Proc. 10th IEEE Int'l Conf. Network Protocols (ICNP '02), IEEE Press, 2002, pp. 78-87.
|
12 |
Y. -C. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks," Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 02), IEEE Press, 2002, pp. 3-13.
|