易平, 蒋嶷川, 钟亦平, 等. 移动Ad hoc 网络安全综述[J]. 电子学报, 2005, 33(5): 893-899.Yi P, Jiang Y C, and Zhong Y P, et al.. A survey of securityfor mobile ad hoc networks [J]. Acta Electronica Sinica, 2005,33(5): 893-899.[2]Zhang Yong-guang and Lee Wenke. Intrusion detection inwireless Ad-hoc networks[C]. Proceedings of The SixthInternational Conference on Mobile Computing andNetworking (MobiCom 2000), Boston, MA, August, 2000:275-283.[3]Zhang Yong-guang and Lee Wenke. Intrusion DetectionTechniques for Mobile Wireless Networks. Mobile Networksand Applications, 2003, 9(5): 545-556.[4]Kachirski O and Guha R. Intrusion detection using mobileagents in wireless ad hoc networks. IEEE Workshop onKnowledge Media Networking (KMN02), Kyoto, Japan,2002: 153-158.[5]Puttini R S.[J].Percher J M, and M L, et al.. A modulararchitecture for distributed IDS in MANET[C]. Proceedingsof the 2003 International Conference on ComputationalScience and Its Applications (ICCSA 2003), Springer Verlag,LNCS 2668, San Diego, USA.2003,:-[6]Huang Yi-an and Lee Wenke. A cooperative intrusiondetection system for ad hoc networks[C]. 2003 ACMWorkshop on Security of Ad Hoc and Sensor Networks(SASN '03), Fairfax, VA, USA, October 31, 2003: 135-147.[7]Sun B, Wu K, and Pooch U W. Routing anomaly detection inmobile ad hoc networks[C]. Proceedings of 12thInternational Conference on Computer Communications andNetworks (ICCCN 03), Dallas, Texas, October 2003: 25-31.[8]Albers P, Camp O, Percher J M, and Jouga B, et al.. Securityin ad hoc Networks: a general intrusion detection architectureenhancing trust based approaches. Proceedings of the FirstInternational Workshop on Wireless Information Systems(WIS-2002), Ciudad Real, Spain, Apr. 2002: 1-12.[9]Bhargava S and Agrawal D P. Security Enhancements inAODV Protocol for Wireless Ad Hoc Networks[C]. VehicularTechnology Conference, 2001: 2143-2147.[10]Wang Wei-chao, Lu Yi, and Bhargava B K. On vulnerabilityand protection of ad hoc on-demand distance vectorprotocol[C]. Proceedings of 10th IEEE InternationalConference on Telecommunication (ICT), Papeete, FrenchPolynesia, 2003: 375-382.[11]Subhadrabandhu D, Sarkar S, and Anjum F. A frameworkfor misuse detection in ad hoc networksPart I[J].IEEEJournal on Selected Areas in Communications.2006, 24(2):274-289[12]Chinyang Henry Tseng, Tao Song, PoornimaBalasubramanyam, Calvin Ko, and Karl Levitt. ASpecification-Based Intrusion Detection Model for OLSR[C].RAID 2005, LNCS 3858, 2006: 330-350.
|