[1] |
CHO J , SWAMI A , CHEN I . A survey on trust management for mobile ad hoc networks[J]. Commun Surveys & Tutorials, 2011,13(4): 562-583.
|
[2] |
YU H , SHEN Z , MIAO C . A survey of trust and reputation management systems in wireless communications[J]. Proc IEEE, 2010,98(10): 1752-1754.
|
[3] |
BUCHEGGER S , LE BOUDEC J . Performance analysis of the confidant protocol[A]. Proc 3rd ACM Int Symp on Mobile Ad Hoc Networking & Computing[C]. 2002.
|
[4] |
MICHIARDI P , MOLVA R . CORE:a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks[A]. Proc 6th Int Conf Commun Multimedia Security[C]. 2002.
|
[5] |
HE Q , WU D , KHOSLA P . SORI:A secure and objective reputation-based incentive scheme for ad-hoc networks[A]. Proc IEEE Wireless Commun Syst Netw Conf[C]. 2004.
|
[6] |
ALMENAREZ F , MARIN A , DIAZ D . Developing a model for trust management in pervasive devices[A]. Proc 4th Annu IEEE Int Conf Pervasive Comput Commun Workshops[C]. 2006.
|
[7] |
BOUKERCH A , XU L,EL-KHATIB K . Trust-based security for wireless ad hoc and sensor networks[J]. Comput Commun, 2007,30(1): 2413-2427.
|
[8] |
MARSH S . Formalising Trust as a Computational Concept[D]. Scotland:University of Stirling, 1994.
|
[9] |
CHO J H , SWAMI A , CHEN I R . Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks[J]. Journal of Network and Computer Applications, 2012,35(3): 1001-1012.
|
[10] |
ZAFAR S , SONI M K . Trust based QoS protocol (TBQP) using meta-heuristic genetic algorithm for optimizing and securing MANET[A]. Optimization,Reliabilty,and Information Technology (ICROIT),2014 International Conference on IEEE[C]. 2014. 173-177.
|
[11] |
EISSA T , RAZAK S A , KHOKHAR R H ,et al. Trust-based routing mechanism in MANET:design and implementation[J]. Mobile Networks and Applications, 2013,18(5): 666-677.
|
[12] |
OMAR M , CHALLAL Y , BOUABDALLAH A . Certification-based trust models in mobile ad hoc networks:a survey and taxonomy[J]. Journal of Network and Computer Applications, 2012,35(1): 268-286.
|
[13] |
GONZALEZ J M , MOHD A , JAMES B D J . Trust-based approaches to solve routing issues in ad-hoc wireless networks[A]. A Survey,2011International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11[C]. 2011.
|
[14] |
WENZHONG Y , CUANHE H , BO W . A general trust model based on trust algebra[A]. Int Conf in Multimedia Inf Networking and Security[C]. 2009. 125-129.
|
[15] |
CHEN A , XU G , YANG Y . A cluster-based trust model for mobile ad hoc networks[A]. The 4th Int Conf on Wireless Communications,Networking and Mobile Computing[C]. 2008.
|
[16] |
SEREDYNSKI M , BOUVRY P , KLOPOTEK M A . Modelling the evolution of cooperative behavior in ad hoc networks using a game based model[A]. IEEE Symp on Computational Intelligence and Games[C]. 2007.
|
[17] |
ROGER B,MYERSON . Game Theory:Analysis of Conflict[M]. Harvard University Press, 1991.
|
[18] |
闻英友, 赵博, 赵宏 . 基于博弈理论的移动自组网激励机制研究[J]. 通信学报, 2014,35(4): 44-52. WEN Y Y , ZHAO B , ZHAO H . Study on game-based incentive mechanism of mobile ad hoc network[J]. Journal on Communications, 2014,35(4): 44-52.
|
[19] |
YU W , LIU K J R . Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks[J]. IEEE Transactions on Mobile Computing, 2007,6(5): 507-521.
|
[20] |
SHEN Y , YAN Z , RAIMO K . Game theoretical analysis of the acceptance of global trust management for unwanted traffic control[A]. IEEE International Conference on High Performance Computing and Communications&2013 IEEE International Conference on Embedded and Ubiquitous Computing[C]. 2013.
|
[21] |
SEREDYNSKI M , BOUVRY P . Analysing the development of cooperation in MANETs using evolutionary game theory[J]. The Journal of Supercomputing, 2013,63(3): 854-870.
|
[22] |
LI Z , SHEN H . Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks[J]. Mobile Computing,IEEE Transactions, 2012,11(8): 1287-1303.
|
[23] |
WEIBULL J W . Evolutionary Game Theory[M]. Cambridge,MA: MIT PressPress, 1995.
|