1 |
P. Papadimitratos and Z. J. Haas, "Secure Message Transmission in Mobile Ad Hoc Networks," Elsevier Ad Hoc Networks J., Elsevier, vol. 1, no. 1, 2003, pp. 193-209.
DOI
ScienceOn
|
2 |
Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," Proc. 22nd Ann. Joint Conf. IEEE Computer and Communications Societies (INFOCOM 2003), IEEE Press, 2003, pp. 1976-1986.
|
3 |
S. Marti, T. J. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. 6th Annual ACM/ IEEE Int'l. Conf. Mobile Computing and Networking, 2000, pp. 255-265.
|
4 |
A. A. Pirzada, C. Mcdonald, and A. Datta, "Performance Comparison of trust-based Reactive Routing Protocols," IEEE Trans. Mobile Computing, vol. 5, Issue 6, June 2006, pp. 695-710.
DOI
ScienceOn
|
5 |
P. Papadimitratos and Z. J. Haas, "Secure Routing: Secure Data Transmission in Mobile Ad Hoc Networks," Proc. ACM Wksp. Wireless Security 2003, Sept. 2003, pp. 41-50.
|
6 |
양환석, 양정모, "MANET에서 효율적 역추적을 위한 경로관리에 관한 연구," 디지털산업정보학회 논문지, 제7권, 제4호, 2011, pp. 31-37.
|
7 |
P. A. R Kumar, S. Selvakumar, "Distribute Denail-of-Service (DDoS) Threat in Collaborative Environment - A survey of DDoS Attack Tools and Traceback Mechanism" IEEE International Advance Computing Conference (IACC 2009), March 2009, pp. 1275-1280.
|
8 |
M. N. Iqbal, J. A. Khan, F. Umer, N. Javaid, I. Haq, M. Shakir, "Security Enhancement of Pro-active Protocols in Mobile Ad-hoc Networks," 2013.
|
9 |
S. A. Mahdi, M. Othman, H. Ibrahim, J. M. Desa and J. Sulaiman" Protocols For Secure Routing And Transmission In Mobile Ad Hoc Network: A Review" Journal of Computer Science, vol. 9, no. 5, 2013, pp. 607-619.
DOI
|
10 |
왕종수, 서두옥, "극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘," 디지털산업정보학회 논문지, 제8권, 제1호, 2012, pp. 171-179.
|