[1] 侯祥博, 王一强, 杨金政. 移动Ad Hoc网络技术研究及应用[J]. 通信技术, 2009, 42(8): 15-20. [2] 周海刚, 肖军模. Ad Hoc网络的安全问题和安全策略[J]. 电信科学, 2001, 17(12): 39-42. [3] Marti S, Giuli T, Kevin L, et al. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks[C]//Proc. of the 6th Annual International Conference on Mobile Computing and Networking. Boston, USA: ACM Press, 2000. [4] Soufiene D. Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges[J]. IEEE Communications Surveys & Tutorials, 2011, 13(4): 658-672. [5] Marias G, Georgiadis P, Flitzanis D, et al. Cooperation Enforcement Schemes for MANETs: A Survey[J]. Communi- cations and Mobile Computing, 2006, 6(3): 319-332. [6] Feeney L. An Energy-consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks[J]. Mobile Networks and Applications, 2001, 6(3): 239-249. [7] Buchegger S, Boudec J. Performance Analysis of the Con- fidant Protocol: Cooperation of Nodes——Fairness in Distri- buted Ad Hoc Networks[C]//Proc. of the 3rd ACM Inter- national Symposium on Mobile Ad Hoc Networking and Computing. Lausanne, Switzerland: [s. n.], 2002. [8] Buttyan L, Hubaux J. Stimulating Cooperation in Self- organizing Mobile Ad Hoc Networks[J]. Mobile Networks and Applications, 2004, 8(5): 579-592. [9] Zhang Yanchao, Lou Wenjing, Liu Wei, et al. A Secure Incentive Protocol for Mobile Ad Hoc Networks[J]. Wireless Networks, 2007, 13(5): 569-582. [10] Elsalih M M, Shen Xuemin. Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System[C]//Proc. of INFOCOM’10. San Diego, USA: [s. n.], 2010. [11] Boukerche A, Turgut B, Aydin N, et al. Routing Protocols in Ad Hoc Networks: A Survey[J]. Computer Networks, 2011, 55(13): 3032- 3080. [12] Perkins C E, Bhagwat P. Highly Dynamic Destination- sequenced Distance-vector Routing(DSDV) for Mobile Computers[C]//Proc. of Conference on Communications Architectures Protocols and Applications. London, UK: ACM Press, 1994. 编辑 刘 冰 |