[1]Hu Y, Perrig A, Johnson D.Packet Leashes:A Defense Against Wormhole Attacks in Wireless Networks[C]∥Proc of the TwentySecond Annual Joint Conf of the IEEE Computer and Communications Societies, 2003:19761986.
[2]Karlof C,Wagner D.Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures[J].Ad Hoc Networks, 2003,1(23):293315.
[3]Douceur J.The Sybil Attack[C]∥Proc of the First Int’l Workshop on PeertoPeer Systems, 2002:251260.
[4]Daley D,Gani J. Epidemic Modelling: An Introduction[M].Cambridge University Press, 2001.
[5]Tanachaiwiwat S H A.EncounterBased Worms: Analysis and Defense[J]. Ad Hoc Networks, 2009,7(7):14141430.
[6]Zou C, Gong W, Towsley D.Worm Propagation Modeling and Analysis Under Dynamic Quarantine Defense[C]∥Proc of the 2003 ACM Workshop on Rapid Malcode, 2003:5160.
[7]Karyotis V,Papavassiliou S.RiskBased Attack Strategies for Mobile Ad Hoc Networks Under Probabilistic Attack Modeling Framework[J].Computer Networks, 2007,51(9):23972410. |