Professional Documents
Culture Documents
Done
Done
After careful and considered review of the content and authorship of this paper by a duly
constituted expert committee, this paper has been found to be in violation of IEEE's
Publication Principles.
This paper contains significant portions of original text from the paper cited below. The
original text was copied without attribution (including appropriate references to the
original author(s) and/or paper title) and without permission.
Due to the nature of this violation, reasonable effort should be made to remove all past
references to this paper, and future references should be made to the following article:
1 2
College of Computer Science and Technology, School of Mathematics and Computer
Huazhong University of Science and Science, Hubei University, Wuhan 430062,
Technology, Wuhan 430074, Hubei, China Hubei, China
sjhhust@163.com sjhhubu@163.com
Foundation item: This work is supported by the National Natural Science Foundation of China (60403027) and the Natural
Science Foundation Of Hubei Province of China (2005ABA243).
References
Figure 2. Packet Delivery Ratio [1] M. G. Zapata and N. Asokan, “Securing Ad hoc
Routing Protocols”, Proceedings of the ACM
Workshop on Wireless Security (WiSe 2002),
September 2002, pp. 1-10
[2] Yih-Chun Hu, Adrian Perrig, and David B. Johnson,
“Ariadne: A Secure On-Demand Routing Protocol
for Ad Hoc Networks”, Proceedings of the Eighth
Annual International Conference on Mobile
Computing and Networking (MobiCom 2002),
ACM, Atlanta, GA, September 2002, pp. 12-23
Figure 3. End-to-End Delay [3] S. Desilva and R.V. Boppana, “Mitigating