[1] Komathy K, Narayanasamy P. Best neighbor strategy to enforce cooperation among selfish nodes in wireless Ad Hoc networks[J]. Computer Communications, 2007, 30(18): 3721-3735. [2] 郑慧芳, 蒋挺, 周正. MANET增强合作模型的理论研究[J]. 北京邮电大学学报, 2008, 31(5): 1-4. Zheng Huifang, Jiang Ting, Zhou Zheng. Theoretical study with the model for MANET cooperation enforcement[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(5): 1-4. [3] Wang Yong, Attebury G, Ramamurthy B. A survey of security issues in wireless sensor networks[J]. IEEE Commun Surveys & Tutorials, 2006, 8(2): 2-23. [4] Song Shanshan, Hwang K, Zhou Runfang, et al. Trusted P2P transactions with fuzzy reputation aggregation[J]. IEEE Internet Computing, 2005, 9(6): 24-34. [5] Perkins C, Belding-Royer E, Das S. RFC 3561, Ad Hoc on-demand distance vector (AODV) routing[S], 2003. [6] 张翔, 吴荣, 汪文勇. 无线移动Ad Hoc网络安全认证机制研究[J]. 电子科技大学学报, 2007, 36(6): 1437-1439. Zhang Xiang, Wu Rong, Wang Wenyong. Security and authentication mechanism research for mobile Ad Hoc network[J]. Journal of University of Electronic Science and Technology of China, 2007, 36(6): 1437-1439. [7] Josang A. A logic for uncertain probabilities[J]. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279-311. [8] Theodorakopoulos G, Baras J S. On trust models and trust evaluation metrics for Ad Hoc networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 318-328. [9] Yu Wei. Game theoretic analysis of cooperation stimulation and security in autonomous mobile Ad Hoc networks[J]. IEEE Trans on Mobile Computing, 2007, 6(5): 507-521. |