[1] |
DARSHANA P , VANDANA V . Security enhancement of AODV protocol for mobile ad hoc network[J]. International Journal of Application or Innovation in Engineering & Management(IJAIEM), 2013,2(1): 317-321.
|
[2] |
ZHU Y , XU B , SHI X H ,et al. A Survey of social-based routing in delay tolerant networks:positive and negative social effects[J]. IEEE Communications Surveys & Tutorials, 2013,15(1): 387-401.
|
[3] |
MANAM V K C , MAHENDRAN V , MURTHY C S R . Performance modeling of DTN routing with heterogeneous and selfish nodes[J]. Wireless Networks, 2014,20(1): 25-40.
|
[4] |
LI Y , SU G , WANG Z . Evaluating the effects of node cooperation on DTN routing[J]. AEU-International Journal of Electronics and Communications, 2012,66(1): 62-67.
|
[5] |
RESTA G , SANTI P . A framework for routing performance analysis in delay tolerant networks with application to noncooperative networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,23(1): 2-10.
|
[6] |
ZHU H , DU S , GAO Z ,et al. A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(1): 22-32.
|
[7] |
ANUSHA T , RAO N S . Improving the trust and adversary detection process for delay-tolerant networks[J]. International Journal of Computer Science and Mobile Applications, 2013,1(5): 44-50.
|
[8] |
GOVINDAN K , MOHAPATRA P . Trust computations and trust dynamics in mobile adhoc networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2012,14(2): 279-298.
|
[9] |
WANG X , LIU L , SU J . Rlm:a general model for trust representation and aggregation[J]. IEEE Transactions on Services Computing, 2012,5(1): 131-143.
|
[10] |
LI F , WU J , SRINIVASAN A . Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets[A]. IEEE INFOCOM 2009[C]. 2009. 2428-2436.
|
[11] |
LI N , DAS S K . A trust-based framework for data forwarding in opportunistic networks[J]. Ad Hoc Networks, 2011,11(4): 1497-1509.
|
[12] |
AYDAY E , FEKRI F . An iterative algorithm for trust management and adversary detection for delay-tolerant networks[J]. IEEE Transactions on Mobile Computing, 2012,11(9): 1514-1531.
|
[13] |
HUI P , CROWCROFT J , YONEKI E . BUBBLE rap:social-based forwarding in delay-tolerant Networks[J]. IEEE Transactions on Mobile Computing, 2011,10(11): 1576-1589.
|
[14] |
EYUPHAN B , BOLESLAW K . Exploiting friendship relations for efficient routing in mobile social networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,23(12): 2254-2265.
|
[15] |
CHEUNG S , SUN Y , ABERER K ,et al. Guest editorial:special issue on privacy and trust management in cloud and distributed systems[J]. IEEE Transactions on Information Forensics and Security, 2013,8(6): 835-837.
|
[16] |
KER?NEN A , OTT J,K?RKK?INEN T . The one simulator for dtn protocol evaluation[A]. Proceedings of the 2nd International Conference on Simulation Tools and Techniques.ICST(Institute for Computer Sciences,Social-Informatics and Telecommunications Engineering)[C]. 2009. 1-10.
|
[17] |
THOMPSON N , NELSON S C , BAKHT M ,et al. Retiring replicants:congestion control for intermittently-connected networks[A]. IEEE INFOCOM[C]. 2010. 1-9.
|
[18] |
LINDGREN A , DORIA A , SCHELEN O . Probabilistic routing in intermittently connected networks[J]. ACM SIGMOBILE Mobile Computing and Communications Review, 2003,7(3): 19-20.
|
[19] |
CHEN I , BAO F , CHANG M ,et al. Dynamic trust management for delay tolerant networks and its application to secure routing[J]. IEEE Transactions on Parallel and Distributed Systems, 2013,25(5): 1200-1210.
|
[20] |
ZHOU H , CHEN J , ZHAO H ,et al. On exploiting contact patterns for data forwarding in duty-cycle opportunistic mobile networks[J]. IEEE Transactions on Vehicular Technology, 2013,62(9): 4629-4642.
|
[21] |
孙利民, 李建中, 陈渝 . 无线传感器网络[M]. 北京: 清华大学出版社, 2005. SUN L , LI J Z , CHEN Y . Wireless Sensor Networks[M]. Beijing: Tsinghua University Press, 2005.
|