参考文献
[ 1 ] Vasilescu I,Kotay K,Rus D. Data Collection,Storage, and Retrieval with an Underwater Sensor Network[C] / /
Proceedings of the 3rd International Conference on
Embedded Networked Sensor Systems. New York,USA: ACM Press,2005:154-165.
[ 2 ] Juang P, Oki H, Wang Yong, et al. Energy-efficient
Computing for Wildlife Tracking: Design Tradeoffs and
Early Experiences with ZebraNet[J]. SIGARCH Computer
Architecture News,2002,30(5):96-107.
[ 3 ] Campbell A,Eisenman S,Lane N,et al. People Centric
Urban Sensing [ C ] / / Proceedings of WICON ’ 06.
Los Alamitos,USA:IEEE Computer Society,2006:2-5.
[ 4 ] 廖 俊,刘耀宗,姜海涛. 基于人工免疫的MANET 不端
行为检查模型[J]. 南京理工大学学报,2011,35(5):
652-658.
[ 5 ] Khalil I,Bagchi S,Rotaru C N,et al. UnMask:Utilizing
Neighbor Monitoring for Attack Mitigation in Multihop
Wireless Sensor Networks[J]. Ad Hoc Networks,2010,
8(2):148-164.
[ 6 ] 徐 佳,李千目,张 宏,等. 机会网络中的自适应喷
雾路由及其性能评估[J]. 计算机研究与发展,2010,
47(9):1622-1632.
[ 7 ] Chuah M,Yang P,Han J. A Ferry-based Intrusion Detection
Scheme for Sparsely Connected Ad Hoc Networks[
C] / / Proceedings of the 4th Annual International
Conference on Mobile and Ubiquitous Systems: Networking & Services. [S. l. ]:IEEE Press,2007:1-8.
[ 8 ] Ren Yanzhi, Chuah M C, Yang J, et al. MUTON: Detecting Malicious Nodes in Disruption-tolerant
Networks[ C ] / / Proceedings of WCNC ’ 10. [ S. l. ]: IEEE Press,2010:1-6.
[ 9 ] Dini G,Duca A L. Towards a Reputation-based Routing
Protocol to Contrast Blackholes in a Delay Tolerant
Network[J]. Ad Hoc Networks,2012,10(7):1167-1178.
[10] Saha S,Verma R,Sengupta S,et al. SRSnF:A Strategy for
Secured Routing in Spray and Focus Routing Protocol for
DTN[C]/ / Proceedings of ACITY’ 12. Chennai, India:
[s. n. ],2012:159-169.
[11] Shah R C,Roy S,Jain S,et al. Data MULEs:Modeling a
Three-tier Architecture for Sparse Sensor Networks[C]/ /
Proceedings of the 1st International Workshop on Sensor
Network Protocols and Applications. [S. l. ]:IEEE Press,
2003:30-41.
[12] Ren Yanzhi, Chuah M C, Yang Jie, et al. Detecting
Blackhole Attacks in Disruption-tolerant Networks
Through Packet Exchange Recording[C] / / Proceedings
of WoWMoM’10. [S. l. ]:IEEE Press,2010:1-6.
[13] Ari K,J?rg O,Teemu K. The ONE Simulator for DTN
Protocol Evaluation [C]/ / Proceedings of ACM International
Conference on Simulation Tools and Techniques.
New York,USA:ACM Press,2009:1-10.
编辑 金胡考 |