1Jakobsson M,Wetzel S.Security Weaknesses in Bluetooth[J].Lecture Notes in Computer Science,Springer Berlin / Heidelberg,2001
2L Venkatraman,D P Aagrawal.Strategies for Enhancing Routing Security in Protocols for Mobile Ad hoc Networks[J].Journal of Parallel and Distributed Computing,2003,63(2):214-227
1l Chlamtac, M Conti, et al. Mobile Ad hoc Networking: Imperatives and Challenges[J]. Ad hoc Net works, 2003,1(1) :13-64.
2Luis F G Sarmenta. Sabotage-tolerance Mechanism for Volunteer Computing Systems [ J ]. Future Generation Computer Systems, 2002,18(4) :561-572.
3C Perkins. Highly Dynamic Destination-Sequenced Distance-Vector routing ( DSDV ) for Mobile Computers [ C ]. Proceedings of SIGCOMM, 1994.
4S Murthy, et al. An Efficient Routing Protocol for Wireless Networks[ J ]. Mobile Networks and Applications, 1996,1 ( 2 ) : 183-197.
5C E Perkins, E M Royer. Ad hoc On-demand Distance Vector Routing[J]. IEEE Workshop on Mobile Computing Systems and Applications, 1999,(2) :90-100.
6D B Johnson. Routing in Ad hoc Networks of Mobile Hosts[ C]. Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, 1994, ( 12 ) : 158-163.
7K Sanzgiri, B Dahill, et al. A Secure Routing Protocol for Ad hoc Networks [ C ]. Proceedings of the 10th IEEE International Conference on Network Protocols, 2002. 1-10.
8Hongmei Deng,et al. Routing Security in Wireless Ad hoc Networks[J]. IEEE Communications Magazine,2002, (10) :70-75.
9C1 Karlof, D Wager. Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures [ J ]. Ad hoe Networks, 2003, ( 1 ) :293-315.
10Miller B P, et al. A Re-examination of the Reliability of UNIX Utilities and Services[ R]. Department of Computer Science, University of Wisconsin,1995. 1-30.