1 |
H. Jhaveri and D. Patel and D. Parmar and I. Shah, "MANET Routing Protocols and Wormhole Attack against AODV", IJCSNS International Journal of Computer Science and Network Security, Vol.10, No.4, Apr., 2010.
|
2 |
C. Komala and S. Srinivas and S. Padmashree and E. Elevarasi, "Wireless Ad hoc Mobile Networks", National Conference on Computing Communication and Technology, pp.168-174, 2010.
|
3 |
A. H. A. Rahman and Z. A. Z.ukarnain, "Performance Comparison of AODV,DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks", European Journal of Scientific Research, pp.566-576, 2009.
|
4 |
S. K. B.V and V. A.L, "Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism, International Journal of Scientific & Engineering Research, Vol.1, Issue3, Dec., 2010.
|
5 |
N. S. M. Usop and A. Abdullah and A. F. Abidin, "PerformanceEvaluation of AODV,DSDV & DSR Routing Protocol in Grid Environment", IJCSNS International Journal of Computer Science and Network Security, pp.261-268, 2009.
|
6 |
H. Rutvij and D. Ashish and D. Jatin, "MANET Routing Protocols and Wormhole Attack against AODV", IJCSNS International Journal of Computer Science and Network Security, Vol.10, No.4, Apr., 2010.
|
7 |
김재홍, 김세헌, "MANET에서 wormhole 공격의 탐지 및 방지 를 위한 알고리즘에 대한 연구", 한국경영과학회 추계학술대회 및 정기총회, pp.494-497, 2008.
|
8 |
배달형, 조용건, "NCW 컴퓨터네트워크작전(CNO)의 작전적 원리와 한국군의 발전방향", 국방연구, 2009.
|
9 |
H. Yang and H. Luo and F. Ye and S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions", IEEE Wireless Communications, 2004.
|
10 |
황윤철, "MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계", 한국통신학회논문지 제35권 제3호(네트워크 및 서비스), pp.373-563, 2010.
|