参考文献
[1]Chen Kang,Shen Haiying,Zhang Haibo.Leveraging Social Networks for P2P Content-based File Sharing in Disconnected MANETs[J].IEEE Transactions on Mobile Computing,2014,13(2):235-249.
[2]Aggarwal A,Gandhi S,Chaubey N.Performance Analysis of AODV,DSDV and DSR in MANETs[J].International Journal of Distributed & Parallel Systems,2014,2(6):353-365.
[3]Zhang Jinbei,Wang Xinbing,Tian Xiaohua,et al.Optimal Multicast Capacity and Delay Tradeoffs in MANETs[J].IEEE Transactions on Mobile Computing,2014,13(5):1104-1117.
[4]吴大鹏,周之楠,张炎,等.消息内容保护的间断连接移动自组织网络转发机制[J].电子与信息学报,2015,37(6):1271-1278.
[5]Verma V K,Singh S,Pathak N P.Analysis of Scalability for AODV Routing Protocol in Wireless Sensor Networks[J].International Journal for Light and Electron Optics,2014,125(2):748-750.
[6]Bourke T,Glabbeek R V,Hfner P.A Mechanized Proof of Loop Freedom of the (Untimed) AODV Routing Protocol[J].Bastien Bernela,2014,8837(6):47-63.
[7]曹洁,张华隆.城市车载Ad Hoc网络下改进的AODV协议[J].兰州理工大学学报,2014,40(1):99-103.
[8]Karthikeyan B,Kanimozhi N,Ganesh S H.Analysis of Reactive AODV Routing Protocol for MANET[C]//Proceedings of World Congress on Computing and Communication Technologies.Washington D.C.,USA:IEEE Press,2014:264-267.
[9]李向丽,李超超.基于小世界理论和QoS支持的DSR协议[J].传感器与微系统,2014,33(2):43-46.
[10]Varshney T,Katiyar A,Sharma P.Performance Improvement of MANET Under DSR Protocol Using Swarm Optimization[C]//Proceedings of International Conference on Issues and Challenges in Intelligent Computing Techniques.Washington D.C.,USA:IEEE Press,2014:58-63.
[11]Bhatt U R,Nema N,Upadhyay R.Enhanced DSR:AnEfficient Routing Protocol for MANET[C]//Proceedings of International Conference on Issues and Challenges in Intelligent Computing Techniques.Washington D.C.,USA:IEEE Press,2014:215-219.
(下转第142页)
(上接第133页)
[12]Liu Wei,Yu Ming.AASR:Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments[J].IEEE Transactions on Vehicular Technology,2014,63(9):4585-4593.
[13]Wei Zhexiong,Tang Helen,Yu F R,et al.Security Enhancements for Mobile Ad Hoc Networks(MANETs) with Trust Management Using Uncertain Reasoning[J].IEEE Transactions on Vehicular Technology,2014,63(9):4647-4658.
[14]Lee C S.A Study on Effectiveness Using Security Routing Based on Mobile Ad-hoc Networks[J].International Journal of Security & Its Applications,2015,9(7):141-152.
[15]Zapata M G.Secure Ad Hoc On-demand Distance Vector Routing[J].ACM Sigmobile Mobile Computing & Communication Review,2002,6(3):106-107.
[16]Li Huaizhi,Singhal M.A Secure Routing Protocol for Wireless Ad Hoc Networks[C]//Proceedings of the 39th Annual Hawaii International Conference on System Sciences.Washington D.C.,USA:IEEE Press,2006:225-235.
[17]The Network Simulator -NS-2[EB/OL].(2016-08-01).http://www.isi.edu/nsnam/ns/.
编辑顾逸斐 |