[16] |
乔秀全, 杨春, 李晓峰 , 等. 社交网络服务中一种基于用户上下文的信任度计算方法[J]. 计算机学报, 2011,34(12):2406-2413. QIAO X Q , YANG C , LI X F , et al. A trust calculating algorithm based on social networking service users' context[J]. Chinese Journal of Computers, 2011,34(12):2406-2413.
|
[17] |
刘文懋, 殷丽华, 方滨兴 , 等. 物联网环境下的信任机制研究[J]. 计算机学报, 2012,35(5):846-855. LIU W M , YIN L H , FANG B X , et al. A hierarchical trust model for the Internet of things[J]. Chinese Journal of Computers, 2012,35(5):846-855.
|
[18] |
YU F R , TANG H , HUANG M , , et al. Distributed cooperative spec-trum sensing in mobile ad hoc networks with cognitive radios[J]. Mathematics, 2011(3):26-30.
|
[19] |
MARTI S , GIULI T J , LAI K , et al. Mitigating routing misbehavior in mobile ad hoc networks[C]//The Proceedings of the 6th Annual Inter-national Conference on Mobile Computing and Networking. 2000:255-265.
|
[20] |
GUHA R , GIULI R , RAGHAVAN P , et al. Propagation of trust and distrust[C]//The 13th International Conference on World Wide Web. 2004:403-412.
|
[21] |
BUCHEGGER S , BOUDEC J Y . A robust reputation system for P2P and mobile ad hoc networks[C]//2nd Workshop on Economics of Peer-to-Peer Systems. 2004:1-6.
|
[22] |
许智君, 胡琪, 张玉军 , 等. MANET网络激励节点协作的信任评估路由协议[J]. 通信学报, 2012,7(9):27-35. XU Z J , HU Q , ZHANG Y J , et al. Trust evaluation routing protocol to enforce cooperation in mobile ad hoc networks[J]. Journal on Com-munications, 2012,7(9):27-35.
|
[23] |
QIN T , YU H , LEUNG C , et al. Towards a trust aware cognitive radio architecture[J]. ACM Sigmobile Mobile Computing and Communica-tions Review, 2009,13(2):86-95.
|
[24] |
ZENG K , PAWELCZAK P , CABRIC D . Reputation-based cooperative spectrum sensing with trusted nodes assistance[J]. IEEE Communica-tion Letters, 2010,14(03):226-228.
|
[25] |
闫琦, 杨家玮, 张雯 . 认知无线电网络中安全的合作频谱感知[J]. 北京邮电大学学报, 2011,34(2):71-7. YAN Q , YANG J W , ZHANG W . The sensing of the secure coopera-tive spectrum in cognitive radio networks[J]. Journal of Beijing Uni-versity of Posts and Telecommunications, 2011,34(2):71-7.
|
[26] |
FENG J Y , LU G Y , MIN X C . Social incentives for cooperative spec-trum sensing in distributed cognitive radio networks[J]. KSII Transac-tions on Internet and Information Systems, 2014,8(2):355-369.
|
[27] |
FENG J Y , ZHANG Y Q , LU G Y , et al. Securing cooperative spec-trum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks[J]. Security and Communication Networks, 2015,8(17):3157-3166.
|
[1] |
SHAH M A , ZHANG S . A novel multi-fold security framework for cognitive radio wireless ad-hoc networks [C]//The IEEE 18th In-ternational Conference on Automation and Computing. 2012:1-6.
|
[2] |
AKYILDIZ I F , LEE W Y , CHOWDHURY K R . CRAHNs:cognitive radio ad hoc networks[J]. Ad Hoc Networks, 2009,7(5):810-836.
|
[3] |
JEON W S , HAN J A , JEONG D G . A novel MAC scheme for mul-tichannel cognitive radio ad hoc networks[J]. IEEE Transactions on Mobile Computing, 2012,11(6):922-934.
|
[4] |
CACCIAPUOTIA A S , CALEFFIA M , PAURA L . Reactive routing for mobile cognitive radio ad hoc networks[J]. Ad Hoc Networks, 2012,10(5):803-815.
|
[5] |
AKYILDIZ I F , LO B F , BALAKRISHNAN R . Cooperative spectrum sensing in cognitive radio networks:a survey[J]. Physical Communi-cation, 2011,4(1):40-62.
|
[6] |
CHEN R L , PARK J M , HOU Y T . Toward secure distributed spectrum sensing in cognitive radio networks[J]. IEEE Communications Maga-zine, 2008,46(4):50-55.
|
[7] |
CARVALHO M . Security in mobile ad hoc networks[J]. IEEE Secu-rity & Privacy, 2008,6:72-75.
|
[2] |
王梅, 吴蒙 . MANET 中常见的路由安全威胁及相应解决方案[J]. 通信学报, 2005,26(5):106-112. WANG M , WU M . Dominating security threats in MANET and their corresponding solutions[J]. ournal on Communications, 2005,26(5):106-112.
|
[9] |
RICHARD F , HUANG M Y , TANG H . Biologically inspired consen-sus-based spectrum sensing in mobile ad hoc networks with cognitive radios[J]. IEEE Network, 2010,24(3):26-30.
|
[10] |
LI S , ZHU H J , YANG B , et al. Towards a game theoretical modeling of rational collaborative spectrum sensing in cognitive radio net-works[C]//The IEEE International Conference on Communication. 2012:1-5.
|
[11] |
冯景瑜 . 协作频谱感知中的SSDF攻击及其对策研究[J]. 电信科学, 2014,30(1):67-72. FENG J Y . Research on SSDF attack and defense for cooperative spectrum sensing[J]. Telecommunications Science, 2014,30(1):67-72.
|
[12] |
BLAZE M , FEIGENBANM J , STRAUSS M . Compliance checking in the PolicyMaker trust management system[C]//The International Con-ference on Financial Cryptography Springer-Verlag. 1998:254-274.
|
[13] |
LI X Y , ZHOU F , YANG X D . Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,23(10):1944-1957.
|
[14] |
BOUKERCHE A , REN Y , PAZZI R W . An adaptive computational trust model for mobile ad hoc networks[C]//2009 International Con-ference on Wireless Communications and Mobile Computing. 2009:191-195.
|
[28] |
FENG J Y , ZHANG Y Q , WANG H G , et al. Supporting secure spec-trum sensing data transmission against SSDH attack in cognitive radio ad hoc networks[J]. Journal of Network and Computer Applications, 2016,72(9):140-149.
|
[15] |
GANERIWAL S , BALZANO L K , SRIVASTAVA M B . Reputa-tion-based framework for high integrity sensor networks[J]. ACM Transactions on Sensor Networks, 2008(4):1-37.
|