Research on Ad Hoc Network Security Protection Model Based on Mobile Agent

Article Preview

Abstract:

security objectives, and the commonly used Mobile Ad hoc networks security protection technology, and finally discusses the application of mobile Ad hoc network in the field, and their security policy are analyzed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3008-3011

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Zhou L, Haas Z J. Securing ad hoc networks[ J] . IEEE Net work Magazine, Special Issue on Network Security, 1999, 13( 6) : 24- 30.

DOI: 10.1109/65.806983

Google Scholar

[2] Rappaport S. Wireless communication s: principles and practice[ M] . Upper Saddle River, NJ : Prentice H al l, 1995. 72- 75.

Google Scholar

[3] Zhang Y, Lee W. Intrusion detect ion in w ireless ad hoc net works[ J/ OL] . http: / / dependability. cs. virginia. edu/ bibliography/ p.275- zhang. pdf , 2004-10-10.

Google Scholar

[4] Zhou Lidong, Zygmunt J Hass. Securing Ad hoc networks [J]. EEE Nerworks Special Issue on Network Security, 1999, 7(6): 24~30.

DOI: 10.1109/65.806983

Google Scholar

[5] Garfinkel T, Matthews J, Hoff C, et al. Virtual machine contracts for datacenter and cloud computing environments[C] . Proceedings of the 1st Workshop on Automated Control for Datacenters and Clouds, ACM, New York, 2009: 25-30.

DOI: 10.1145/1555271.1555278

Google Scholar