[1] Shi M L, Ying C. Routing protocols for Ad Hoc networks: a survey [J]. Journal of China Institute of Communication, 2001, 22(11):93-103(in Chinese). 史美林,英春. 自组网路由协议综述 [J].通信学报,2001,22(11):93-103.
[2] Zapata M G. Secure Ad Hoc on-demand distance vector routing [J]. ACM Mobile Computing and Communication Review (MCIR),2002,6(3):106-107.
[3] Phung H P, Myeongjae Y. Securing AODV routing protocol in mobile Ad-Hoc networks //Lecture Notes in Computer Science, 7th International Working Conference, IWAN 2005. 2005.
[4] Liu W, Chai Q L. Prevention of black-hole attacks using worm-holes theories [J]. Computer Engineering and Design, 2007, 28(20):4888-4890,4894(in Chinese). 刘伟,柴乔林. 利用虫洞原理抵御黑洞攻击的方法 [J].计算机工程与设计, 2007,28(20):4888-4890,4894.
[5] Perkins C E, Belding-Royer E M, Das S R. Ad Hoc on-demand distance vector (AODV) routing //Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications.1999:90.
[6] Perkins C E, Belding-Royer E M, Das S R. RFC3561-Ad Hoc on-demand distance vector .(2005-02-17) . http://www.cnpaf.net/Class/Rfcen/200502/4623_2.html.
|