无线异构网络的关键安全技术
g and Computing in MOBIHOC’ 01), Oct 4-5, 2001, Long Beach, CA, USA. New York, NY, USA: ACM, 2001:146-155.
[15] Zapata m g, Asokan n. Securing ad hoc routing protocols[C]// Proceedings of ACM Workshop on Wireless Security (WiSe’02), Sep 28, 2002, Atlanta, GA, USA. New York, NY, USA: ACM, 2002:1-10.
[16] Binkley j, Trost w. Authenticated ad hoc routing at link layer for mobile systems[J]. Wireless Networks, 2001, 7(2):139-145.
[17] Marti s, Giuli t, Lai k, at al. Mitigating routing misbehavior in mobile wireless networks[C]// Proceedings of 6th Annual International Conference on Mobile Computing and Networking (MOBICOM’00), Aug 6-11,2000,Boston,MA,USA.New York,NY,USA:ACM,2000: 255-265.
[18] Buchegger s, Le Boudec j v. Performance analysis of the confident protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks) [C]// Proceedings of 6th Annual International Conference on Mobile Computing and Networking (MOBICOM'00), Aug 6-11, 2000, Boston, MA, USA. New York, NY, USA: ACM, 2000: 226-236.
[19] Wang Weichao, YI Lu, Bhargava b k. On vulnerability and protection of ad hoc on-demand distance vector prototol[C]// Proceedings of International Conference on Telecommunication (ICT’03): Vol 1, Feb23-Mar 1, 2003, Paris, France. Piscataway, NJ, USA: IEEE, 2003:375-382.
[20] Ala-Laurila j, Mikkonen j, Rinnemaa j. Wireless LAN access network architecture for mobile operators[J]. IEEE Communications Magazine, 2001, 39(11): 82-89.
[21] Luo h, Jiang z, Kim b j, et al. Integrating wireless LAN and cellular data for the enterprise[J]. IEEE Internet Computing, 2003, 7(2):25-33.
[22] 3GPP TS 23.234 V6.1.0. 3GPP System to WLAN Interworking; System Description[S].
[23] 3GPP TS 33.234 V1.0.1. 3G Security: Wireless Local Area Network (WLAN) Interworking Security[S].
[24] Bhargava b, Wu Xiaoxin , LU Yi, et al.Integrating heterogeneous wireless technologies: A cellular aided mobile ad hoc network (CAMA) [J]. Mobile Networks and Applications,2004, 9(4):393-408.
[25] Luo H, Ramjee R, Sinha P, et al. UCAN: a unified cellular and ad hoc network architecture[C]// /Proceedings of 9th Annual International Conference on Mobile Computing and Networking(MOBICOM'03),Sep 14-19,2003, San Diego, CA, USA. New York, NY, USA: ACM, 2003:353-367.
[26] Carbunar b, loannidis l, Nita-Rotaru c. JANUS: Towards robust and malicious resilient routing in hybrid wireless networks[C]// Proceedings of the ACM Workshop on Wireless Security (WiSe'04), Oct 1, 2004, Philadelphia, PA, USA . New York, NY, USA: ACM, 2004: 11-20.
[27] Durresi A,Evans L,Paruchuri V, et al. Secure 3G user authentication in ad hoc serving networks[C]// Proceedings of the 1st International Conference on Availability, Reliability and Security (ARES'06), Apr 20-22,2006,Vienna, Austria. Los Alamitos, CA, USA: IEEE Computer Society, 2006: 488- 495.
[28] Aboudagga n, Refaei m t, Eltoweissy m, et al. Authentication protocols for ad hoc networks: Taxonomy and research issues [C]// Proceedings of the 1st ACM international workshop on Quality of Service & security in wireless and mobile networks(Q2SWinet'05), Oct 13, 2005, Quebec, Canada. New York, NY, USA: ACM, 2005:96-104.
[29] Kachirski o, Guha r. Intrusion detection using mobile agents in wireless ad hoc networks [C]//Proceedings of IEEE Worhshop on Knowledge Media Networking (KMN'02), Jul 10-12, 2002, Kyoto,Japan. Piscataway, NJ, USA: IEEE, 2002: 153-158.
[30] Zhang Y, Lee W, Huang Y A. Intrusion detection techniques for mobile wireless networks[J].Wireless Networks,2003, 9 (5):545-556.
[31] Gevaryahu r, Yaros b. Misuse Detection and Preventio
- 新一代移动通信系统的关键技术(10-26)
- SoC面临挑战,智能分割顺势而起(11-07)
- 让ADSL上网更高效 谈谈如何选好“猫”(01-08)
- 用ADSL Modem设置家庭网共享(01-08)
- ADSL Modem路由功能全接触(01-08)
- ADSL变慢原因查找和排除八项总结(01-10)