[1] Akyildiz I F, Wang X. A survey on wireless mesh networks [J]. IEEE Communications Magazine, 2005,43(9): S23-S30.[2] Bejerano Y, Han S J, Kumar A. Efficient loadbalancing routing for wireless mesh networks [J]. Computer Networks, 2007, 51(10): 2450-2466.[3] Eriksson J, Faloutsos M, Krishnamurthy S V.DART: Dynamic address routing for scalable ad hoc and mesh networks [J]. IEEE/ACM Transactions on Networking, 2007, 51(1): 119-132.[4] Johnson D B, Maltz D A, Broch J. The dynamic source routing protocol for multihop wireless ad hoc networks [M]. Boston, USA: Addison-Wesley, 2001:139-172.[5] Nandiraju N S, Nandiraju D S, Agrawal D P. Multipath routing in wireless mesh networks [C]//IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS). Vancouver, Canada:IEEE, 2006: 741-746.[6] Zheng J, Lee M J. A resource-efficient and scalable wireless mesh routing protocol [J]. Ad Hoc Networks,2007, 5(6): 704-718.[7] Martucci L, Zuccato A, Fischer-H¨ubner S. Identity deployment and management in wireless mesh networks[C]//The Future of Identity in the Information Society — Proceedings of the 3rd IFIP. Karlstad, Sweden:Springer, 2007: 223-234.[8] Hu Y C, Perrig A, Johnson D B. Rushing attacks and defense in wireless ad hoc network routing protocols[C]//Proceedings of the 2nd ACM Workshop on Wireless Security (WiSe ’03). New York, USA: ACM,2003: 30-40.[9] Deng J, Han R, Mishra S. INSENS: Intrusiontolerant routing for wireless sensor networks [J]. Computer Communications, 2006, 29(2): 216-230.[10] Li C, Wang Z, Yang C. Secure routing for wireless mesh networks [J]. International Journal of Network Security, 2011, 13(2): 109-120.[11] Jiang T, Li Q, Ruan Y. Secure dynamic source routing protocol [C]//Proceedings of the Fourth International Conference on Computer and Information Technology (CIT ’04 ). Washington DC, USA: IEEE, 2004:528-533.[12] Kargl F, Geis A, Schlott S, et al. Secure dynamic source routing [C]//Proceedings of the 38th Annual Hawaii International Conference on System Sciences.Washington DC, USA: IEEE, 2005.[13] Kim J, Tsudik G. SRDP: Secure route discovery for dynamic source routing in MANETs [J]. Ad Hoc Networks,2009, 7(6): 1097-1109.[14] Mavropodi R, Kotzanikolaou P, Douligeris C.SecMR — A secure multipath routing protocol for ad hoc networks [J]. Ad Hoc Networks, 2007, 5(1): 87-99.[15] Krichene N, Boudriga N. Intrusion tolerant routing for mesh networks [C]//2007 IFIP International Conference on Wireless and Optical Communications Networks. Singapore: IEEE, 2007.[16] Sumy.WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks [J].Computers & Security, 2010, 29(2): 208-224.[17] Lacuesta R, Lloret J, Garciab M, et al. Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks [J]. Journal of Network and Computer Applications, 2011, 34(2): 492-505. |