%0 Journal Article %T Review of Security Techniques for Mobile Ad Hoc Networks
移动自组网安全技术研究 %A ZHANG Peng %A SUN Lei %A CUI Yong %A HAN Xiu-feng %A
张鹏 %A 孙磊 %A 崔勇 %A 韩秀峰 %J 计算机科学 %D 2009 %I %X Mobile Ad Hoc networks are particularly vulnerable due to their features of dynamic changing topology,and wireless communication.Current security techniques for mobile Ad Hoc networks are divided into five categories:intrusion detection,securing routing protocols,architecture and models,key management techniques and others.Using intrusion detection,nodes' behaviors were analyzed and detected based on particular mathematics modules.Securing routing protocols include novel securing routing protocols and secur... %K Mobile ad hoc network %K Dynamic %K Intrusion detection %K Securing routing protocols %K Key
移动自组织网络 %K 动态性 %K 入侵检测与防范 %K 安全路由协议 %K 密钥 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=EA3041345357A05032D8F41FCF53D864&yid=DE12191FBD62783C&vid=933658645952ED9F&iid=DF92D298D3FF1E6E&sid=CA4FD0336C81A37A&eid=DF92D298D3FF1E6E&journal_id=1002-137X&journal_name=计算机科学&referenced_num=1&reference_num=43