|
[1] Lidong Zhou and Zygmunt J. Haas, “Securing Ad hoc networkss, ” IEEE Network Magazine, vol. 13, no.6, November/December 1999. [2] Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad hoc networks,” IEEE Communications Magzine, vol. 40, no. 10, October 2002. [3] Elizabeth M. Royer and Chai-Keong Toh, “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks,” IEEE Personal Communications, pp. 46-55, April 1999. [4] Charles E. Perkins and Elizabeth M. Royer, “Ad-hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, November 2002. [5] David B. Johnson and David A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, pages 153-181, Kluwer Academic Publishers, 1996. [6] D. Nguyen, L. Zhao, P. Uisawang, and J. Platt, “Security Routing Analysis for Mobile Ad hoc networkss,” wahrscheinlich 2001, Publikation unbekannt. [7] Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad hoc networkss,” 6th Int’l. Conference Mobile Comp. Net., Mobicom 2000, pp. 275-283, August 2000. [8] S. Bhargava and D.P. Agrawal, ”Security enhancements in AODV protocol for wireless ad hoc networkss,” VTC 2001 Fall. IEEE VTS 54th , vol.4, pp 2143 -2147, Oct. 2001. [9] V. Gupta, S. Krishnamurthy, and M. Faloutsos, “Denial of service attacks at the MAC layer in wireless ad hoc networkss,” MILCOM 2002. Proceedings, vol.2, pp 1118 -1123, Oct. 2002. [10] Arun Kumar, Jessi K. Koput, Saijai Chancham, and YoungMi Kim, “Denial of Service Attacks in Ad hoc networkss” A capstone paper submitted as partial fulfillment of the requirements for the degree of Masters in Interdisciplinary Telecommunications at the University of Colorado, Boulder, May 2, 2003. Project directed by Professor Timothy X Brown. [11] R. Sanjay, F. Huirong, S. Manohar, D. John, and N. Kendall, “Prevention of Cooperative Black Hole Attack in Wireless Ad hoc networks,” The 2003 International Conference on Wireless Networks (ICWN 2003). [12] 台灣電腦網路危機處理曁協調中心”無線網路安全白皮書” http://www.cert.org.tw/document/docfile/Wireless_Security.pdf [13] William Stallings ”Network Security Essentials Applications and Standards” Prentice Hall Publishers. [14] Seungjoon Lee, Bohyung Han, Minho Shin ”Robust Routing in Wireless Ad hoc networkss” 2002 International Conference on Parallel Processing Workshops (ICPPW''02) August 18 - 21, 2002 Vancouver, B.C., Canada
|