参考文献
[ 1 ] 易 平,蒋嶷川,张世永,等. 移动Ad Hoc 网络安全综
述[J]. 电子学报,2005,33(5):893-899.
[ 2 ] Aravindh S, Vinoth R S, Vijayan R. A Trust Based
Approach for Detection and Isolation of Malicious Nodes
in MANET [ J ]. International Journal of Engineering
Science & Technology,2013,5(2):193-199.
[ 3 ] Chatterjee M,Das S K,Turgut D. WCA:A Weighted
Clustering Algorithm for Mobile Ad Hoc Networks[J].
Cluster Computing,2002,5(2):193-204.
[ 4 ] Thirumurugan S,Raj E. W-PAC:An Efficient Weighted
Partitioning Around Cluster Head Mechanism for Ad
Hoc Network[C] / / Proceedings of the 2nd International
Conference on Computational Science,Engineering and
Information Technology. [ S. 1. ]: ACM Press, 2012:
182-188.
[ 5 ] 张 强,胡光明,陈海涛,等. MANET 基于客观信任度
建模的分簇算法与分析[J]. 通信学报,2009,30(2):
12-21.
[ 6 ] Yu Y,Guo L,Wang X,et al. Routing Security Scheme
Based on Reputation Evaluation in Hierarchical Ad Hoc
Networks [ J ]. Computer Networks, 2010, 54 ( 9 ):
1460-1469.
[ 7 ] Jin S, Park C, Choi D, et al. Cluster-based Trust
Evaluation Scheme in an Ad Hoc Network [ J ].
Electronics and Telecommunications Research Institute
Journal,2005,27(4):465-468.
[ 8 ] Yassein M B,Hijazi N. Improvement on Cluster Based
Routing Protocol by Using Vice Cluster Head [ C ] / /
Proceedings of the 4th International Conference on Next
Generation Mobile Applications, Services and Technologies.
[S. 1. ]:IEEE Press,2010:137-141.
[ 9 ] Safa H,Artail H,Tabet D. A Cluster-based Trust-aware
Routing Protocol for Mobile Ad Hoc Networks [ J ].
Wireless Networks,2010,16(4):969-984.
[10] Bechler M,Hof H J, Kraft D, et al. A Cluster-based
Security Architecture for Ad Hoc Networks [ C ] / /
Proceedings of INFOCOM’ 04. [S. 1. ]:IEEE Press,
2004:2393-2403.
[11] 李永军,代亚非. 对等网络信任机制研究[J]. 计算机
学报,2010,33(3):390-405.
[12] 沈昌祥,张焕国,王怀民,等. 可信计算的研究与发
展[J]. 中国科学:信息科学,2010,40(2):139-166.
[13] 甘早斌,丁 倩,李 开,等. 基于声誉的多维度信任
计算算法[J]. 软件学报,2011,22(10):2401-2411.
[14] 孙 苏,仲 红,石润华,等. 基于信任评估的Ad Hoc
网络安全路由协议[J]. 计算机工程,2012,38(20):
76-80.
编辑 索书志 |