共 4 条
[3]
Exploiting KAD[J] . Moritz Steiner,Taoufik En-Najjary,Ernst W. Biersack.ACM SIGCOMM Computer Communication Review . 2007 (5)
[4]
Secure routing in wireless sensor networks: attacks and countermeasures[J] . Chris Karlof,David Wagner.Ad Hoc Networks . 2003 (2)