[1] |
胡华平, 胡光明, 董攀 等. 大规模移动自组网络安全技术综述[J]. 计算机研究与发展, 2007,44(4):545-552. HU H P , HU G M , DONG P , et al. Survey of security technology for large scale MANET[J]. Journal of Computer Research and Development, 2007,44(4):545-552.
|
[2] |
刘永亮, 高文, 姚鸿勋 等. Aydos等基于椭圆曲线密码学无线认证协议的安全性[J]. 计算机研究与发展, 2006,43(12):2076-2081. LIU Y L , GAO W , YAO H , et al. Security on Aydos et al's elliptic curve cryptography based wireless authentication protocol[J]. Journal of Computer Research and Development, 2006,43(12):2076-2081.
|
[3] |
冯涛, 王毅琳, 马建峰 . 一种新的基于椭圆曲线密码体制的Ad hoc组密钥管理方案[J]. 电子学报, 2009,37(5):918-924. FENG T , WANG Y , MA J . A new Ad Hoc group key agreement scheme based on ECC[J]. Acta Electronica Sinica, 2009,37(5):918-924.
|
[4] |
李慧贤, 庞辽军, 王育民 等. 适合Ad Hoc网络无需安全信道的密钥管理方案[J]. 通信学报, 2010,31(1):112-117. LI H X , PANG L J , WANG Y M , et al. Key management scheme with-out secure channel for ad hoc networks[J]. Journal on Communica-tions, 2010,31(1):112-117.
|
[5] |
张串绒, 张玉清, 李发根 等. 适于Ad Hoc网络安全通信的新签密算法[J]. 通信学报, 2010,31(3):19-24. ZHANG C R , ZHANG Y Q , LI F G , et al. New signcryption algorithm for secure communication of ad hoc networks[J]. Journal on Commu-nications, 2010,31(3):19-24.
|
[6] |
AHMAD M S , TADAKAMADLA S . Short paper: security evaluation of IEEE 802.11 w specification[A]. Proceedings of the Fourth ACM Conference on Wireless Network Security[C]. Hamburg, Germany, 2011.53-58.
|
[7] |
李小青, 李晖, 杨凯 等. 一种基于D-S证据理论的Ad Hoc网络安全路由协议[J]. 计算机研究与发展, 2011,48(8):1406-1413. LI X Q , LI H , YANG K , et al. A secure routing protocol based on D-S evidence theory in ad hoc networks[J]. Journal of Computer Research and Development, 2011,48(8):1406-1413.
|
[8] |
忖颖芳, 张兴, 张婷 等. 无线mesh网络中的虫洞攻击检测研究[J]. 通信学报, 2011,32(1):59-65. FU Y F , ZHANG X , ZHANG T , et al. Research on wormhole attacks in wireless mesh networks[J]. Journal on Communications, 2011,32(1):59-65.
|
[9] |
SHU T , KRUNZ M . Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing[A]. Pro-ceedings of the Fifth ACM Conference on Security and Privacy in Wire-less and Mobile Networks[C]. Tucson, Arizona, USA, 2012.87-98.
|
[10] |
刘方斌, 张琨, 李海 等. 无可信中心的门限追踪Ad Hoc网络匿名认证[J]. 通信学报, 2012,33(8):208-213. LIU F B , ZHANG K , LI H , et al. Threshold traceability anonymous authentication scheme without trusted center for Ad Hoc network[J]. Journal on Communications, 2012,33(8):208-213.
|
[11] |
韩磊, 刘吉强, 韩臻 等. 移动Ad Hoc网络预分配非对称密钥管理方案[J]. 通信学报, 2012,33(10):26-34. HAN L , LIU J Q , HAN Z , et al. Pre-distribution asymmetric key man-agement scheme for mobile ad hoc networks[J]. Journal on Commu-nications, 2012,33(10):26-34.
|
[12] |
吴呈邑, 熊焰, 黄文超 等. 移动自组网中基于动态第三方的可信公平非抵赖协议[J]. 电子学报, 2013,41(2):227-232. WU C Y , XIONG Y , HUANG W C , et al. A trusted fair non-repudiation protocol based on dynamic third party in mobile Ad Hoc networks[J]. Acta Electronica Sinica, 2013,41(2):227-232.
|
[13] |
Kent S , Atkinson R . RFC2406: IP encapsulating security payload (EsP)[EB/OL]. .
|
[14] |
Kent S , Atkinson R . RFC 2402: IP authentication header[EB/OL]. .
|
[15] |
Harkins D , Carrel D . RFC 2409: The internet key exchange (IKE)[EB/OL]. .
|
[16] |
Kaufman C . RFC 4306: internet key exchange (IKEv2) protocol[EB/OL]. .
|