3Cui, XX., Lin, C, and Wei, YY. A multiobjective model for QoS multicast routing based on genetic algorithm [A]. In: Proceedings of the 2003 International Conference on Com- puter Networks and Mobile Computing [C](ICCNMC' 03), Shanghai, China, October 20-23, 2003, 49-53.
二级参考文献13
1Mauve M. , Widmer J. , Hartenstein H.. A survey on position based routing in mobile Ad Hoe networks. IEEE Network,Maihofer, 2001, 15(6) : 30-39
2Zapata M. , Asokan N.. Securing Ad Hoc routing protocols.In: Proceedings of the ACM Workshop on Wireless Security(WiSe), Atlanta, GA, 2002, 1-10
3Hu Y.-C. , Perrig A. , Johnson D. B.. Ariadne: a secure on demand routing protocol for Ad Hoc networks. In: Proceedings of the ACM Mobicom, Atlanta, 2002, 12-23
4Hu Y. , Johnson D. , Perrig A.. SEAD: Secure efficient distance vector routing for mobile Ad Hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems Applications (WMCSA 2002), Calicoon, 2002, 3-13
5Hu Y. C. , Perrig A. , Johnson D.B.. Packet leashes: A defense against wormhole attacks in wireless network. In: Proceedings of the IEEE INFOCOM, San Francisco, CA, 2003,1976-1986
6Perrig A. , Canetti R. , Tygar J. D. , Song D.. The TESLA broadcast authentication protocol. RSA Laboratories: Crypto-Bytes Technical Newsletter, 2002, 5(2): 2-13
7Karp B. , Kung H. T.. GPSR.. Greedy perimeter stateless rouring for wireless network. In: Proceedings of the ACM Mobicom, Boston, MA, 2000, 243-254
8Jiang ZL, Jiang SX. Formal language and automata theory.Beijing: Tsinghua University Press, 2003
9Buchegger S. , Boudec J-Y. L.. Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, 2002, 226-236
10Buchegger S. , Le Boudec J-Y.. A robust reputation system for mobile Ad-Hoc networks. EPFL Technical Report No. IC/2003/50, EPFL-DI-ICA, Lausunne, Switzerland, 2003
2MARWAHA S,CHEN K T,SRINIVASAN D. Mobile agentsbased routing protocol for mobile Ad hoc networks [C].Pro.ceedings of IEEE Globecom. [S.l.]:IEEE,2002,1:163-167.
3MARWAHA S,CHEN K T,SRINIVASAN D. A novel routingprotocol using mobile agents and reactive route discovery forad hoc wireless networks [C].2002 10th IEEE InternationalConference on Networks. [S.l.]:IEEE,2002:311-316.
4AISSANI M,FENOUCHE M,SADOUR H,et al. Ant.DSR:cache maintenance based routing protocol for mobile Ad . hocnetworks [C]// Advanced International Conference on Telecom.munications. [S.l.]:IEEE Computer Society,2007:35-35.
5CHPUDHURY R R,BANDYOPADHYAY S,PAUL K. A dis.tributed mechanism for topology discovery in Ad hoc wirelessnetworks using mobile agents [C].Proceedings of the 1st ACMinternational symposium on Mobile Ad hoc Networking & Com.puting. [S.l.]:IEEE Press,2000:145-146.
6CHOUDHURY R.R,PAUL K,BANDYOPADHYAY S. Multi.agent routing protocol for mobile wireless Ad hoc networks [J].Autonomous agents and multi.agent systems,2004,8:47-68.
7A,FAR B. Performance of mobile agent based net.work topology discovery [C].Canadian Conference on Electri.cal and Computer Engineering. Canada:[s.n.],2007:66.69.