[1] |
ELMASRY G F.Tactical wireless communications and networks design concepts and challenges[M].New York,USA:Wiley Publishing,2012.
|
[2] |
贾华杰,鲜明,陈永光.网络中心战及其新技术[J].国防科技,2011,32(4):44-49.
|
[3] |
HARRIS A C I.Effects-based operations:applying network centric warfare in peace,crisis,and war[J].Naval War College Review,2011,57(2):180-181.
|
[4] |
BURBANK J L,CHIMENTO P F,HABERMAN B K,et al.Key challenges of military tactical networking and the elusive promise of MANET technology[J].IEEE Communications Magazine,2006,44(11):39-45.
|
[5] |
DIFFIE W,HELLMAN M.New directions in cryptography [J].IEEE Transactions on Information Theory,1976,22(6):644-654.
|
[6] |
JHARBADE N K,SHRIVASTAVA R.Network based security model using symmetric key cryptography (AES 256-Rijndael algorithm) with public key exchange protocol (Diffie-Hellman key exchange protocol)[J].International Journal of Computer Science,2012,12(8):69-73.
|
[7] |
陈少华,樊晓光,禚真福,等.一种基于身份的Ad Hoc优化密钥管理方案[J].计算机工程,2016,42(4):131-142.
|
[8] |
RACHEDI A,BENSLIMANE A.Security and pseudo-anonymity with a cluster-based approach for MANET[C]//Proceedings of Global Telecommunications Conference.Washington D.C.,USA:IEEE Press,2008:1-6.
|
[9] |
VODNALA D,KUMAR S P,ALUVALA S.An efficient backbone based quick link failure recovery multicast routing protocol[J].Perspectives in Science,2016,8:135-137.
|
[10] |
孙斌.移动自组网密钥管理体系的研究[D].北京:北京邮电大学,2009.
|
[11] |
ZHENG Yuliang.Digital signcryption or how to achieve cost (signature & encryption)< [12]PINTSOV L A,VANSTONE S A.Postal revenue collection in the digital age[C]//Proceedings of International Conference on Financial Cryptography.Berlin,Germany:Springer,2000:105-120.
|
[13] |
PEI Guangyu,LY H,GERLA M,et al.Hierarchical routing for multi-layer Ad-Hoc wireless networks with UAVs[C]//Proceedings of IEEE Military Communications Conference.Washington D.C.,USA:IEEE Press,2002:310-314.
|
[14] |
IYER R K,DABROWSKI P,NAKKA N,et al.Reconfigurable tamper-resistant hardware support against insider threats:the trusted ILLIAC approach[M]//STOLFO S J,BELLOVIN S M,KEROMYTIS A D,et al.Insider Attack and Cyber Security.Berlin,Germany:Springer,2008.
|
[15] |
YAVUZ A A,ALAGOZ F,ANARIM E.HIMUTSIS:hierarchical multi-tier adaptive ad-hoc network security protocol based on signcryption type key exchange schemes[C]//Proceedings of International Symposium on Computer and Information Sciences.Berlin,Germany:Springer,2006:434-444.
|
[16] |
AMIN R,BISWAS G P.A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks[J].Ad Hoc Networks,2015,36:58-80.
|