References
- Bekmezci, Ilker, O. K. Sahingoz, and S. Temel, "Flying Ad-Hoc Networks (FANETs): A survey," Ad Hoc Networks, Vol. 11, No. 3, pp. 1254-1270, May 2013. DOI: 10.1016/j.adhoc.2012.12.004
- Ha, Il-Kyu, "Analysis of Efficient Health Data Transmission Methods based on the Fusion of WBAN and FANET," Journal of the Korea Institute of Information and Communication Engineering, Vol. 21, No. 2, pp. 386-394, Feb 2017. DOI: 10.6109/jkiice.2017.21.2.386
- C. E. Perkins, E. M. Royer, "Ad-hoc on-demand distance vector routing," Proc. of the WMCSA'99 Second IEEE Workshop on Mobile Computing Systems and Applications, pp. 90-100, New Orleans, LA, USA, 1999. DOI: 10.1109/MCSA.1999.749281
- C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina, "Performance comparison of two on-demand routing protocols for ad hoc networks", IEEE Personal communications, Vol. 8, No. 1, pp. 16-28, Feb 2001. DOI: 10.1109/98.904895
- V. Mulert, J. I. Welch, and W. K. Seah, "Security threats and solutions in MANETs: A case study using AODV and SAODV," Journal of network and computer applications, Vol. 35, No. 4, pp. 1249-1259, July 2012. DOI: 10.1016/j.jnca.2012.01.019
- K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. B. Royer, "A secure routing protocol for ad hoc networks," Proc. of the 10th IEEE International Conference on Network Protocols, pp. 78-87, Paris, France, Nov 2002. DOI: 10.1109/ICNP.2002.1181388
- M. G. Zapata, N. Asokan, "Securing ad hoc routing protocols," Proc. of the 1st ACM workshop on Wireless security, pp. 1-10, Atlanta GA USA, Sept 2002. DOI: 10.1145/570681.570682
- Q. Li, M. Zhao, J. Walker, Y. C. Hu, A. Perrig and W. Trappe. "SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks", Security and Communication Networks, Vol. 2, No. 4, pp. 325-340, Sept 2008. DOI: 10.1002/sec.60
- M. Mohammadizadeh, A. Movaghar, S. M. Safi "SEAODV: Secure efficient AODV routing protocol for MANETs networks", Proc of the 2nd International Conference on Interaction Sciences : Information Technology, Culture and Human, pp. 940-944, Seoul Korea, Nov 2009. DOI: 10.1145/1655925.1656096
- A. Perrig, R. Canetti, J. D. Tygar, D. Song,"The TESLA broadcast authentication protocol", Rsa Laboratories Cryptobytes, Vol. 5, No. 2, pp. 2-13, Fall 2002. DOI: 10.1007/978-1-4615-0229-6_3
- Baek. Jong-Hak, Sin. Gwang-Jo, "Development and Application of Security Chip Technology Using PUF Technology", The Magazine of the IEIE, Vol. 43, No. 7, pp. 59-67, July 2016.
- Sumin Kim, "A Study on the Development of Secure Communication Channel Using PUF Technology in M-IoT Environmen," Jouranl of Information and Security, Vol. 19, No. 5, pp. 107-118, Dec 2019.
-
T. W. Kim, B. D. Choi and D. K. Kim, "Zero bit error rate ID generation circuit using via formation probability in
$0.18{\mu}m$ CMOS process", Electronics letters, Vol. 50, No. 12, pp. 876-877, June 2014. DOI: 10.1049/el.2013.3474 - Ahn Hyo min, "Destination-initiated Fast Route Acquisition Scheme for AODV", Dept. of Electrical and Electronic Engineering, The Graduate School Yonsei University, 2003