1 |
Cavalcanti D , Cordeiro C M , Agrawal D P , et al. Issues in integrating cellular networks,WLANs and MANETs:a futuristic heterogeneous wireless network. IEEE Wireless Communications, 2008,15(4): 16~23
|
2 |
Li X J , Seet B C , Chong P H J . Multihop cellular networks:technology and economics. Computer Networks, 2008,52(9): 1825~1837
|
3 |
钱宗峰, 张德兴, 孔昭煜 . 蜂窝网与ad hoc网融合技术探讨. 电信快报, 2009(6): 11~14
|
4 |
Lin Y , Hsu Y . Multihop cellular:a new architecture for wireless communications.In: Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, 2000
|
5 |
Wu H Y , Qiao C M , De S , et al. Integrated cellular and ad hoc relaying systems:iCAR. IEEE Journal on selected Areas in Communications, 2001,19(10): 2105~2115
|
6 |
郭代飞, 杨义先, 李作为 等. 数字身份认证技术的现状与发展. 计算机安全, 2003(29): 1~4
|
7 |
3GPP TS 33.102 V8.5.0.3G security. 3G security,security architecture (release 8), 2009
|
8 |
Ahmadian Z , Salimi S , Salahi . A new attacks on UMTS network access. Wireless Telecommunications Symposium.Piscataway:WTS, 2009
|
9 |
Meyer U , Wetzel S . A man-in-the-middle attack on UMTS.In: ACM Workshop on Wireless Security, New York,USA, 2004
|
10 |
Farooq A , Petros M . 无线 ad hoc 网络安全. 北京: 清华大学出版社, 2009
|
11 |
Zhou L , Hass Z . Securing ad hoc networks. IEEE Networks, 1999,13(6): 24~30
|
12 |
Luo H Y , Kong J J , Petros Z , et al. URSA:ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking, 2004,12(6): 1049~1063
|
13 |
Kong J J , Petros Z , Luo H Y , et al. Providing robust and ubiquitous security support for mobile ad hoc networks.In: Ninth International Conference on Network Protocols, 2001
|
14 |
Capkun S , Buttyan L , Hubaux J P . Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2003,2(1): 52~64
|
15 |
Hubaux J P , Buttyan L , Capkun S . The quest for security in mobile ad hoc networks.In: 2nd ACM International Symposium on Mobile ad hoc Networking & Computing, New York,USA, 2001
|
16 |
OˊShea G , Roe M . Child-proof authentication for MIPv6(CAM). ACM SIGCOMM Computer Communication Review, 2001,31(2): 4~8
|
17 |
Montenegro G , Castelluccia C . Statistically unique and cryptographically verifiable(SUCV)identifiers and addresses.In: Ninth Annual Network and Distributed System Security Symp, 2002
|
18 |
Xie B , Srinivasan A K S , Agrawal D P . GMSP:a generalized multihop security protocol for heterogeneous multihop wireless network.In: Wireless Communications and Networking Conference, 2006
|
19 |
孙德庆 . 无线自组网与蜂窝网融合路由协议的研究. 哈尔滨: 哈尔滨工业大学, 2009
|
20 |
Bharat B , Wu X X , Lu Y , et al. Integrating heterogeneous wireless technologies:a cellular aided mobile ad hoc network (CAMA). Mobile Networks and Applications, 2004,9(4): 393~408
|
21 |
Luo H , et al. UCAN:a unified cellular and ad hoc network architecture.In: Annual International Conference on Mobile Computing and Networking, New York,USA, 2003
|
22 |
Zhou J J , Yang Y R . PARCELs:pervasive ad hoc relaying for cellular systems.In: 1st Mediterranean Workshop on ad hoc Networks, Sadegna,Italy, 2002
|
23 |
Wu X X , Mukeherjee B , Chan S H G . MACA-an efficient channel allocation scheme in cellular networks.In: Global Telecommunications Conference, 2000
|
24 |
吴蒙, 季丽娜, 王堃 . 无线异构网络的关键安全技术. 中兴通讯技术, 2008,14(3): 32~37
|
25 |
Hass J J , Yih-Chun Hu . Secure unified cellular ad hoc network routing.In: Global Telecommunication Conference,Piscataway:IEEE, 2009
|
26 |
Wang K , Wu M , Xia P R , et al. A secure authentication scheme for integration of cellular networks and MANETs.In: 2008 International Conference Neural Networks and Signal, 2008
|
27 |
Mahmoud M , Shen X . Anonymous and authenticated routing in multihop cellular networks.In: International Conference on Communications, 2009
|
28 |
Pellegrini A , Bertacco B , Austin T . Fault based attack of RSA authentication.In: Design,Automation & Test in Europe Conference & Exhibition(DATE), 2010
|