参考文献
[ 1 ] Fall K. A Delay-tolerant Network Architecture for Challenged
Internets[C] / / Proc. of SIGCOMM’03. [S. 1. ]: IEEE Press,2003:27-34.
[ 2 ] 苏金树,胡乔林,赵宝康,等. 容延容断网络路由技术
[J]. 软件学报,2010,21(1):119-122.
[ 3 ] Vahdat A, Becker D. Epidemic Routing for Partially
Connected Ad Hoc Networks[R]. Durham,USA:Duke
University,Technical Report:CS-2000-06,2000.
[ 4 ] Lindgren A, Schelen D O. Probabilistic Routing in
Intermittently Connected Networks[J]. Mobile Computing
Communications,2003,7(3):19-20.
[ 5 ] Spyropoulos T,Psounis K,Raghavendra C S. Efficient
Routing in Intermittently Connected Mobile Networks: the Multiple-copy Case [ J ]. IEEE / ACM Trans. on
Network,2008,16(1):77-90.
[ 6 ] Balasubramanian A,Levine B N,Venkataramani A. DTN
Routing As A Resource Allocation Problem[C]/ / Proc. of
ACM SIGCOMM’ 07. Kyoto, Japan: ACM Press,2007:
373-384.
[ 7 ] Motani M,Srinivasan V,Nuggehalli P. PeopleNet:Engineering
A Wireless Virtual Social Network[C] / / Proc. of
MobiCom’05. [S. 1. ]:IEEE Press,2005:243-257.
[ 8 ] Hui P,Chaintreau A,Scott J,et al. Pocket Switched Networks
and Human Mobility in Conference Environments
[C]/ / Proc. of SIGCOMM’05. [S. 1. ]:IEEE Press,2005:
212-219.
[ 9 ] 赵广松,陈 鸣. 自私性机会网络中激励感知的内容
分发的研究[J]. 通信学报,2013,34(2):73-84.
[10] Xu Z,Jin Y,Shu W,et al. Sred:A Secure Reputation-based
Dynamic Window Scheme for Disruption-tolerant Networks
[C]/ / Proc. of MILCOM’09. Boston,USA:[s. n. ],2009:
1-7.
[11] Li N,Das S K. A Trust-based Framework for Data Forwarding
in Opportunistic Networks [ J]. Ad Hoc Networks,
2013,11(4):1497-1509.
[12] Dini G, Duca a l. Towards Reputation-based Routing
Protocol to Contrast Blackholes in A Delay Tolerant
Network [ EB / OL ] / / ( 2012-10-10 ). http:/ / dx. doi.
org / 10. 1016/ j. adhoc. 2012. 03. 003.
[13] Li F,Wu J,Avinash S. Thwarting Blackhole Attacks in
Disruption Tolerant Networks Using Encounter Tickets
[C] / / Proc. of INFOCOM’ 09. Riode Janeiro,Brazil:
[s. n. ],2009:2428-2436.
[14] Ren Y,Chuah M C,Yang J,et al. Detecting Blackhole
Attacks in Disruption-tolerant Networks Through Packet
Exchange Recording [ C ] / / Proc. of WoWMoM ’ 10.
Montreal,Canada:[s. n. ],2010:1-6.
[15] Chuah M,Yang P. Impact of Selective Dropping Attacks
on Network Coding Performance in DTNS and A
Potential Mitigation Scheme[C] / / Proc. of ICCCN’09.
San Francisco,USA:[s. n. ],2009:1-6.
[16] Keranen A. Opportunistic Network Environment Simulator[
D]. Helsinki,Finland:Helsinki University of Technology,
2008.
[17] Eagle A,Pentland A,Lazer D. Inferring Social Network
Structure Using Mobile Phone Data [ C ] / / Proc. of
PNAS’09. [S. 1. ]:IEEE Press,2009:15274-15278.
编辑 索书志 |