[1] Sanzgiri K,Dahill B,Levine B N,et al.A secure routing protocol for Ad hoc networks[C]//The 10th IEEE International Conference on Network Protocols.Paris: IEEE Press,2002: 78-87.[2] Hu Yin Chun,Johnson D B,Perrig A.Sead: secure efficient distance vector routing for mobile wireless Ad hoc networks[C]//The 4th IEEE Workshop on Mobile Computing Systems & Applications.NY: IEEE Press,2002: 3-13.[3] 李冰,袁坚,王剑,等.基于多维Hash链的无线Ad-hoc安全路由数字签名方案[J].清华大学学报: 自然科学版,2009,49(1): 57-60.Li Bing,Yuan Jian,Wang Jian,et al.Digital signature scheme based on multi-dimensional Hash chains for wireless Ad-hoc routing security[J].Journal of Tsinghua University: Science and Technology,2009,49(1): 57-60.[4] Buchegger S,Boudec J Y.Performance analysis of the confidant protocol[C]//The 3rd ACM International Symposium on Mobile Ad hoc Networking & Computing.New York: IEEE Press,2002: 226-236.[5] 王建新,张亚男,王伟平,等.移动自组网中基于声誉机制的安全路由协议设计与分析[J].电子学报,2005,4(4): 596-601.Wang Jianxin,Zhang Ya'nan,Wang Weiping,et al.A security routing protocol based on reputation systems in MANET[J].Chinese Journal of Electronics,2005,4(4): 596-601.[6] Sun Yuxing, Huang Songhua, Chen Lijun, et al. Bayesian decision-making based recommendation trust revision model in Ad hoc networks[J]. Journal of Software, 2009, 20(9): 2574- 2586. [7] 杜君, 李伟华. 面向多跳无线自组织网络的安全信任模型[J]. 吉林大学学报: 工学版, 2011, 9(5): 1421-1425. Du Jun, Li Weihua. Security trust model for multihop wireless Ad hoc networks [J]. Journal of Jilin University: Engineering and Technology Edition, 2011, 9(5): 1421-1425. [8] 喻莉, 李静茹, 刘祖浩, 等. 基于自适应遗忘机制的半环信任模型[J]. 电子信息学报, 2011, 33(1): 175-179. Yu Li, Li Jingru, Liu Zuhao, et al. Semiring trust model based on adaptive forgetting scheme[J]. Journal of Electronics & Information Technology, 2011, 33(1): 175-179. [9] 洪亮, 洪帆, 彭冰, 等. 一种基于邻居信任评估的虫洞防御机制[J]. 计算机科学, 2006, 33 (8): 130-133. Hong Liang, Hong Fan, Peng Bing, et al. Defend against wormhole attack based on neighbor trust evaluation in MANET [J]. Computer Science, 2006, 33(8): 130-133. [10] 张骞, 张霞, 文学志, 等. Peer-to-Peer环境下多粒度Trust模型构造[J]. 软件学报, 2006, 17(1): 96-107. Zhang Qian, Zhang Xia, Wen Xuezhi, et al. Construction of peer-to-peer multiple-grain trust model [J]. Journal of Software, 2006, 17(1): 96-107. [11] 甘早斌, 丁倩, 李开, 等. 基于声誉的多维度信任计算算法[J]. 软件学报, 2011, 22(10): 2401-2411. Gan Zaobin, Ding Qian, Li Kai, et al. Reputation-based multi-dimensional trust algorithm [J]. Journal of Software, 2011, 22(10): 2401-2411. |