[1] |
MARTI S , GIULI T , LAI K ,et al. Mitigating routing misbehavior in mobile ad hoc networks[A]. Proc MobiCom’00[C]. NY,USA, 2000. 255-265.
|
[2] |
DJAHEL S , NAIT-ABDESSELAM F , ZHANG Z . Mitigating packet dropping problem in mobile ad hoc networks:proposals and challenges[J]. Communications Surveys&Tutorials, 2010,99: 1-15.
|
[3] |
YU H , SHEN Z , MIAO C ,et al. A survey of trust and reputation management systems in wireless communications[J]. Proceedings of the IEEE, 2010,98(10): 1755-1772.
|
[4] |
YOO Y , AGRAWAL D P . Why does it pay to be selfish in a MANET[J]. IEEE Wireless Communications, 2006,13(6): 87-97.
|
[5] |
BUTTYáN L , HUBAUX J P . Enforcing service availability in mobile ad-hoc networks[A]. Proc MobiHoc’00[C]. Boston,USA, 2000. 87-96.
|
[6] |
ANDEREGG L , EIDENBENZ S . Ad hoc-VCG:a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents[A]. Proc MobiCom’03[C]. NY,USA, 2003. 245-259.
|
[7] |
ZHONG S , CHEN J , YANG Y R . Sprite:a simple,cheat-proof,credit-based system for mobile ad-hoc networks[A]. Proc IEEE INFOCOM 2003[C]. USA, 2003. 1987-1997.
|
[8] |
SRINIVASAN V , NUGGEHALLI P , CHIASSERIN C F ,et al. Cooperation in wireless ad hoc networks[A]. Proc IEEE INFOCOM 2003[C]. USA, 2003. 808-817.
|
[9] |
MAHAJAN R , RODRIG M , WETHERALL D ,et al. Experiences applying game theory to system design[A]. Proc ACM PINS’04[C]. NY,USA, 2004. 183-190.
|
[10] |
WEI H Y , GITLIN R D . Incentive scheduling for cooperative relay in WWAN/WLAN two-hop-relay network[A]. Proc IEEE Wireless Communication and Network Conference 2005[C]. LA,USA, 2005. 1696-1701.
|
[11] |
BUCHEGGER S , BOUDEC J Y L . Performance analysis of the CONFIDANT protocol:cooperation of nodes fairness in dynamic ad hoc networks[A]. Proc MobiHoc’02[C]. NY,USA, 2002. 226-236.
|
[12] |
MICHIARDI P , MOLVA R . Core:a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks[A]. Proc of Communication and Multimedia Security 2002[C]. Portoroz,Slovenia, 2002. 107-121.
|
[13] |
MIRANDA H , RODRIGUES L . Friends and foes:preventing selfishness in open mobile ad hoc networks[A]. Proc 23rd International Conference on Distributed Computing Systems Workshops 2003[C]. USA, 2003. 440-445.
|
[14] |
JOHNSON D B , MALTZ D A . Dynamic source routing in ad hoc wireless networks[A]. Mobile Computing[C]. Kluwer, 1996. 153-181.
|
[15] |
JOHNSON D B , MALTZ D A , HU Y C . The Dynamic Source Routing Protocol(DSR)for Mobile Ad Hoc Networks for IPv4[S]. IETF RFC 4728, 2007.
|
[16] |
HU Y C , JOHNSON D B . Caching strategies in on-demand routing protocols for wireless ad hoc networks[A]. Proc MobiCom’00[C]. NY,USA, 2000. 231-242.
|
[17] |
HU Y C , JOHNSON D B . Implicit source routing for on-demand ad hoc network routing[A]. Proc MobilHoc’01[C]. NY,USA, 2001. 1-10.
|
[18] |
HU Y C , PERRIG A , JOHNSON D B . Ariadne:a secure on-demand routing protocol for ad hoc networks[J]. Wireless Network, 2005,11(2): 21-38.
|
[19] |
MIGUEL M C , CASTRO M , NIGHTINGALE E B ,et al. Virtual ring routing:network routing inspired by DHTs[A]. Proc SIGCOMM’06[C]. NY,USA, 2006. 351-362.
|