Citation: | GONG Xudong, XIONG Yan, LU Qiwei, MIAO Fuyou, HUANG Wenchao. A Trusted Ad Hoc Routing Protocol Based on Fuzzy Mathematics[J]. Chinese Journal of Electronics, 2013, 22(1): 155-159. |
Trusted computing group. http://www.trustedcomputinggroup.org/.Accessed July 2011.
|
E. Brickell, J. Camenisch and L. Chen, “Direct anonymous attestation”in Proceedings of the 11th ACM Conference on Computerand Communications Security, pp.132-145, ACM, 2004.
|
L. Chen, H.L. ohr, M. Manulis and A.R. Sadeghi, “Propertybasedattestation without a trusted third party”, InformationSecurity, pp.31-46, 2008.
|
J. Cordasco and S. Wetzel, “An attacker model for MANETrouting security”, in Proceedings of the Second ACM Conferenceon Wireless Network Security, pp.87-94, ACM, 2009.
|
Y.C. Hu, D.B. Johnson and A. Perrig, “SEAD: Secure efficientdistance vector routing for mobile wireless ad hoc networks”,Ad Hoc Networks, Vol.1, No.1, pp.175-192, 2003.
|
Y.C. Hu and A. Perrig, “A survey of secure wireless ad hocrouting”, IEEE Security and Privacy Magazine, Vol.2, pp.28-39, 2004.
|
Y.C. Hu, A. Perrig and D.B. Johnson, “Ariadne: A secure ondemandrouting protocol for ad hoc networks”, Wireless Networks,Vol.11, No.1, pp.21-38, 2005.
|
W. Huang, Y. Xiong and D. Chen, “DAAODV: A Secure AdHoc outing Protocol Based on direct anonymous attestation”, in2009 International Conference on Computational Science andEngineering, pp.809-816, IEEE, 2009.
|
K. Sanzgiri, D. LaFlamme, B. Dahill, B.N. Levine, C. Shieldsand E.M. Belding-Royer, “Authenticated routing for ad hoc networks”,IEEE Journal on Selected Areas in Communications,Vol.23, No.3, pp.598-610, 2005.
|
Agrwal Sudhir, Jain Sanjeev and Sanjeev Sharma, “A surveyof routingattacks and security measures in mobile ad hoc networks”,Journal of Computing, Vol.3, pp.41-48, 2011.
|
L.A. Zadeh, “Fuzzy sets”, Information and Control, Vol.8, No.3,pp.338-353, 1965.
|
M.G. Zapata and N. Asokan, “Securing ad hoc routing protocols”,in Proceedings of the 1st ACM Workshop on WirelessSecurity, pp.1-10, ACM, 2002.
|