[1]
Ping Yi, Yiping Zhong, Shiyong Zhang. Dos Attack and Defense in Mobile Ad Hoc Networks[J]. Journal of Computer Research and Development. 2005, 42(4): 697-704.
DOI: 10.1360/crad20050425
Google Scholar
[2]
HUANG Yufei, WANG Peikang, HUANG Shaobin. Route discovery algorithms based on trust in mobile Ad hoc network[J]. Computer Aided Engineering. 2005, 14(2): 59-62.
Google Scholar
[3]
Zhi Ang EU and Winston Khoon Guan SEAH. Mitigating Route Request Flooding Attacks in Mobile Ad Hoc Networks. ICOIN-2006, Sendai, Japan, 2006. 327-336.
DOI: 10.1007/11919568_33
Google Scholar
[4]
Song Jianhua. Research on Methods of Routing Intrusion Detection in Ad Hoc Networks[D]. Huazhong University of Science and Technology. 2007. 72-76.
Google Scholar
[5]
Ping Yi, Zhoulin Dai, Yiping Zhong, Shiyong Zhang, Resisting Flooding Attacks in Ad Hoc Networks. In: Proceedings of the International Conference on Information Technology: Coding and Computing(ITCC2005), IEEE Press, Las Vegas, USA, April 4-6, 2005. 657-662.
DOI: 10.1109/itcc.2005.248
Google Scholar
[6]
C. Perkins, Ad hoc On-Demand Distance Vector (AODV) Routing, RFC3561[S], 2003, 7.
DOI: 10.17487/rfc3561
Google Scholar