4Chin-Yang Tseng,Balasubramanyam P.A Specification-based Intrusion Detection System for AODV[C]//Proc.of ACM Workshop on Security of Ad Hoc and Sensor Networks,Fairfax,VA,USA.2003.
5Marti S,Giuli T J,Lai K,et al.Mitigating Routing Misbehavior in Mobile Ad Hoc Networks[EB/OL].(2000-09).http://citeseer.nj.nec.com/marti00mitigating.html.
6Balasubramaniyan J S,Fernandez J O G,Isacoff D,et al.An Architecture for Intrusion Detection Using Autonomous Agents[R].Purdue University,1998.
7Perkins C,Royer E,Das S.Ad Hoc on Demand Distance Vector Routing[S].RFC 3561,2003-07.
8Johnson D B,Maltz D A,Hu Y C.The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks[Z].(2004-07).IETF draftietf-manet-dsr10.txt.
9Toh C K.Associatibity-based Routing for Ad Hoc Mobile Networks[J].Wireless Personal Communications,1997,4(2):103-109.
10Zapata M G.Secure Ad Hoc On-demand Distance Vector Routing[[J].ACM Mobile Computing and Communications Review,2002,6(3):106-107.