[1] 程伟明. 无线移动自组网及其关键技术[J]. 数据通信, 2002(3):56-58. Cheng Weiming. Wireless mobile Ad hoc network and its key technologies[J]. Data Communication, 2002(3):56-58.
[2] Mukherjee P, Sen S. Comparing reputation schemes for detecting malicious nodes in sensor networks[J]. The Computer Journal, 2011, 54(3):482-489.
[3] Chen Xi, Sun Liang, Ma Jianfeng, et al. A trust management scheme based on behavior feedback for opportunistic networks[J]. Network Technology and Application, 2015, 12(4):117-129.
[4] Yao Lin, Man Yanmao, Huang Zhong, et al. Secure routing based on social similarity in opportunistic networks[J]. IEEE Transactions on Wireless Communications, 2015, 15(1):594-605.
[5] Josang A, Haller J. Dirichlet reputation systems[C]//International Conference on Availability, Reliability and Security. Vienna:IEEE Press, 2007:112-119.
[6] Li Yang, Kizza J M, Alma-Cemerlic, et al. Fine-grained reputation-based routing in wireless Ad hoc networks[C]//Intelligence and Security Informatics. New Brunswick:IEEE Press, 2007:75-78.
[7] Denko M K, Sun Tao, Woungang I. Trust management in ubiquitous computing:a Bayesian approach[J]. Computer Communications, 2011, 34(3):398-406.
[8] Vahdat A, Becker D. Epidemic routing for partially-connected Ad hoc networks[J]. Master Thesis, 2000, 20(4):106-119.
[9] Zhou Hongbo, Ni L M, Mutka M W. Prophet address allocation for large scale MANETs[J]. Ad Hoc Networks, 2003, 1(4):423-434. |