参考文献
[1]Dahill B,Levine B N,Royer E,et al.A Secure Routing Protocol for Ad Hoc Networks[C]//Proceedings of the 10th IEEE International Conference on Network Protocols.Washington D.C.,USA:IEEE Computer Society,2002:78-87.
[2]Papadimitratos P,Haas Z J.Secure Routing for Mobile Ad Hoc Networks[C]//Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference.Washington D.C.,USA:IEEE Computer Society,2002:193-204.
[3]Hu Y C,Perrig A,Johnson D B.Packet Leashes:A Defense Against Wormhole Attacks in Wireless Networks[C]//Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies.Washington D.C.,USA:IEEE
Computer Society,2003:1976-1986.
[4]Buttyan L,Dora L,Vajda I.Statistical Wormhole Detection in Sensor Networks[C]//Proceedings of the 2nd European Workshop on Security and Privacy in Ad-hoc and Senor Networks.Berlin,Germany:Springer-Verlag,2005:128-141.
[5]Song Ning,Qian Lijun,Li Xiangfang.Wormhole Attacks Detection in Wireless Ad Hoc Networks:A Statistical Analysis Approach[C]//Proceedings of the 19th IEEE International Parallel and Distributed Processing Sympo-sium.Washington
D.C.,USA:IEEE Computer Society,2005:50-59.
[6]Maltz D A,Johnson D B,Hu Y.The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks for IPv4[S].RFC 4728,2007.
[7]Zhen J,Srinivas S.Preventing Replay Attacks for Secure Routing in Ad Hoc Networks[C]//Proceedings of the 2nd International Conference on Ad-Hoc,Mobile,and Wireless Networks.Berlin,Germany:Springer-Verlag,2003:140-150.
[8]Wang Weichao,Bhargava B K,Lu Yi,et al.Defending Against Wormhole Attacks in Mobile Ad Hoc Networks[J].Wireless Communications and Mobile Computing,2006,6(4):483-503.
[9]Wang Xia,Wong J.An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks[C]//Proceedings of IEEE Conference on Computer Software and Applications.Washington D.C.,USA:IEEE Com-puter Society,2007:39-48.
[10]Choi S,Kim D,Lee D,et al.WAP:Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks[C]//Proceedings of IEEE Conference on Sensor Networks,Ubiquitous and Trustworthy Computer.Washington D.C.,USA:IEEE Computer
Society,2008:343-348.
[11]Sharma P,Trivedi P A.An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature[C]//Proceedings of the 3rd IEEE International Conference on Communication Software and Networks.Washington D.C.,USA:IEEE
Computer Society,2011:307-311.
[12]陈世全.模糊预测[M].贵阳:贵州科技出版社,1991:302-315.
[13]陈世全.模糊决策学[M].贵阳:贵州科技出版社,1990:200-255.
[14]van Vaerenbergh S,Via J,Santamaria I.A Sliding-window Kernel RLS Algorithm and Its Application to Nonlinear Channel Identification[C]//Proceedings of 2006 IEEE International Conference on Acoustics,Speech and Signal
Processing.Washington D.C.,USA:IEEE Computer Society,2006:98-103.
[15]Song Sejun,Wu Haijie,Choi B Y.Statistical Wormhole Detection for Mobile Sensor Networks[C]//Proceedings of the 4th International Conference on Ubiquitous and Future Networks.Washington D.C.,USA:IEEE Computer Society,2012:322-327.
编辑金胡考 |