[1] |
杨宏宇, 李航 . 无线 Mesh 网络恶意节点检测模型[J]. 清华大学学报(自然科学版), 2017,57(7): 687-694.
|
|
YANG H Y , LI H . Malicious node detection model for wireless Mesh networks[J]. Journal of Tsinghua University (Science and Technology), 2017,57(7): 687-694.
|
[2] |
BARGHI H , AZHARI V.A practical sleep coordination and management scheme with duty cycle control for energy sustainable IEEE 802 . 11s wireless mesh networks[J]. Wireless Networks, 2018,12(4): 1-26.
|
[3] |
MALARVIZHI L , GOPALAKRISHNAN V . Malicious node detection scheme for upgraded femtocell architecture in wireless mesh networks[J]. Journal of Computational & Theoretical Nanoscience, 2016,13(7): 4573-4579.
|
[4] |
SARMA D , KAR A , MALL R . A hierarchical and role based secure routing protocol for mobile wireless sensor networks[J]. Wireless Personal Communications, 2016,90(3): 1067-1103.
|
[5] |
BOUNOUNI M , BOUALLOUCHE-MEDJKOUNE L . A hybrid stimulation approach for coping against the malevolence and selfishness in mobile Ad Hoc network[J]. Wireless Personal Communications, 2016,88(2): 255-281.
|
[6] |
吴军, 莫伟伟, 印新棋 ,等. 基于反馈可信度的可信机会路由转发模型[J]. 计算机工程与应用, 2017,53(8): 23-28.
|
|
WU J , MO W W , YIN X Q ,et al. Trusted opportunistic routing forwarding model based on feedback credibility[J]. Computer Engineering and Applications, 2017,53(8): 23-28.
|
[7] |
GUO J , ZHOU X , YUAN J ,et al. Secure access control guarding against internal attacks in distributed networks[J]. Wireless Personal Communications, 2013,68(4): 1595-1609.
|
[8] |
SOOKHAK M , AKHUNDZADA A , SOOKHAK A ,et al. Geographic wormhole detection in wireless sensor networks[J]. Plos One, 2015,10(1): 77-98.
|
[9] |
HOOGH J , ZANNONE N . Flow-based reputation with uncertainty:evidence-based subjective logic[J]. International Journal of Information Security, 2016,15(4): 381-402.
|
[10] |
CHO H . Dynamics of uncertain and conflicting opinions in social networks[J]. IEEE Transactions on Computational Social Systems, 2018,5(2): 518-531.
|
[11] |
林晖, 马建峰 . 无线 Mesh 网络中基于跨层信誉机制的安全路由协议[J]. 西安电子科技大学学报, 2014,41(1): 116-123.
|
|
LIN H , MA J F . Cross layer reputation mechanism based secure routing protocol for WMNs[J]. Journal of Xidian University, 2014,41(1): 116-123.
|
[12] |
PLOUMIDIS M , PAPPAS N , TRAGANITIS A . Flow allocation for maximum throughput and bounded delay on multiple disjoint paths for random access wireless multihop networks[J]. IEEE Transactions on Vehicular Technology, 2017,66(1): 720-733.
|