1 |
L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, Nov. 1999
|
2 |
C. E. Perkins and E. M. Royer, "Ad-hoc On-Demand Distance Vector Routing," in The Second IEEE Workshop on Mobile Computing Systems
|
3 |
E. M. Royer and C-K Toh, "A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks," IEEE Personal Communications, Apr. 1999
|
4 |
Y. Seung and P. Naldurg and Robin Kravets, "Security-Awares Ad Hoc Routing for Wireless Networks," In Proceedings of MobiHOC, Oct,2001
|
5 |
J. Broch and D. B. Johnson, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks," IETF Internet Draft, October 1999
|
6 |
Y. Ko and N. H. Vaidya, "Location-Aided Routing(LAR) in Mobile Ad Hoc Networks," in The Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, Dallas, TX, USA, Oct. 1998
|
7 |
K. Fall and K. Varadhan, The ns Manual, UC Berkeley, LBL, USC/ISI, Oct. 2001, Available at http://www.isi.edu/nsnam/ns
|
8 |
이병진, 유상조, "애드 혹 네트워크에서 소스 기반 다중 게이트웨이 선출 라우팅 프로토콜", 한국통신학회논문지 No.8A, Vol.30, pp. 679-680, 2005
과학기술학회마을
|
9 |
J. Raju and J. J. Garcia-Luna-Aceves,"A New Approach to On-demand Loop-Free Multipath Routing," In Proceedings of the Int''l Conf. on Computer Communications and Networks (IC3N), pp.522-527, 1999
|
10 |
V. D. Park and M. S. Corson. "A Highly Adaptive Distributed Routing Algorithm Wireless Networks," In Proceedings of IEEE Infocom, pp.1405-1413, 1997
|
11 |
S. Marti and T. Giuli and K. Lai and M. Baker, "Mitigating Routing Misbehavior in Mobile ad hoc networks," in The Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking, Boston, MA, USA, Aug. 2000
|