[1]
Lidong Zhou, Zygmunt J Haas. Securing Ad Hoc Networks, IEEE Networks Special Isuue on Nerwork Security, 1999, 13(6): 24-30.
DOI: 10.1109/65.806983
Google Scholar
[2]
Semih Dokurer. Simulation of black hole attack in wireless ad-hoc networks[D]. Ankara: Atilim university, (2006).
Google Scholar
[3]
Wei Yu and K.J. Ray Liu. Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks[C]. IEEE Transactions on Information Forensics and security, JUNE 2007, 2(2): 227-239.
DOI: 10.1109/tifs.2007.897269
Google Scholar
[4]
Corson, Macker. Mobile Ad Hoc Networking(MANET): Routing Protocol Performance Issues and Evaluation Considerations, RFC 2501, (1999).
DOI: 10.17487/rfc2501
Google Scholar
[5]
Lei Guang, Assi, C. Vulnerabilities of Ad Hoc Network Routing Protocols to MAC Misbehavior[C]. IEEE Wireless And Mobile Computing, Network And Communication, Aug. 2005, vol. 3: 146-153.
DOI: 10.1109/wimob.2005.1512897
Google Scholar
[6]
Djahel, S.; Nait-Abdesselam, F.; and Ahsan, F. Highlighting the Effects of joint MAC Layer Misbehavior and Virtual Link Attack in Wireless Ad Hoc Networks[C]. IEEE/ACS Computer Systems and Applications, 2009, 756-763.
DOI: 10.1109/aiccsa.2009.5069412
Google Scholar
[7]
Wei Ren, Dit-Yan Yeung, Hai Jin, and Mei Yang. Pulsing RoQ DDoS Attack and Defense Scheme in Mobile Ad Hoc Networks[J]. International Journal of Network Security, Mar 2007, 4(2): 227-234.
Google Scholar
[8]
N Asokan, Philip Ginzboorg. Key Agreement in Ad Hoc Networks, Computer Communications, 2000, 23(17): 1627-1637.
DOI: 10.1016/s0140-3664(00)00249-8
Google Scholar
[9]
X. Hong,M. Gerla,G. Pei, and C. Chiang. A Group Mobility Model for Ad Hoc Wireless Networks[C]. Proceedings of ACM/IEEE MSWiM'99, 1999. 53-60.
DOI: 10.1145/313237.313248
Google Scholar
[10]
G. Bianchi. Performance analysis of the IEEE 802. 11 distributed coordinated function[C]. IEEE JSAC, March 2000, 18(3): 535-547.
Google Scholar