3Ljubica B, Levente B, Srdjan C, et al. Self- organization in mobile Ad hoc network: the approach of terminodes[J]. IEEE Communication Magazine,2001,39(6) :166 - 174.
4Chen Z D, Kung H T, Vlah D. Ad Hoc Relay Wireless Networks over Moving Vehicles on Highways[A]. ACM Special Interest Group on Mobility of Systems, Users, Data and Computing[ C]. California, USA: ACM Press ,2001. 247 - 250.
5Zhou Lidong, Hass Z J. Securing Ad Hoc networks[ J ]. IEEE networks, 1999,13:24 29.
6Chung Weiho. Probabilistic analysis of routes on mobile ad hoc networks[ J ]. IEEE. Communications Letters, 2004,8 ( 8 ) : 506- 508.
7Zhou Lidong,Zygmunt J Hass.Securing Ad Hoc networks[J].IEEE Nerworks Special Issue on Network Security,1999,13(6):24-30.
8Jean-Pierre Hubsux,Levente Buttyan,Srdjan Cspkun.The quest for security in mobile Ad Hoc networks[A].Proc of the 2001 ACM International Symposium on Mobile Ad Hoc networking & computing 2001[C].New York:ACM Press,2001.146-155.
9Zhang Yongguang,Lee Wenke.Intrusion Detection in Wireless Ad Hoc Networks[A].Proc of the 6th Annual ACM/IEEE International Conference on Mobile Coputing and Networking[C].New York:ACM Press,2000.275-283.
10RFC 2501,Mobile Ad Hoc networking(MANET):Routing protocol performance issues and evaluation considerations[S].