参考文献
[1]Li Zexu,Li Yong,Wang Jun,et al.Resource Allocation for Multiuser Two-way Full-duplex Relay Networks[C]//Proceedings of IEEE International Conference on Com-munications.Washington D.C.,USA:IEEE Press,2015:3299-3304.
[2]Liu Yuan,Tao Meixia,Huang Jianwei.Auction-based Optimal Power Allocation in Multiuser Cooperative Networks[C]//Proceedings of IEEE Global Telecom-munications Conference.Washington D.C.,USA:IEEE Press,2011:1-5.
[3]Cho P,Hong Y,Kuo J.A Game Theoretic Approach to Eavesdropper Cooperation in MISO Wireless Net-works[C]//Proceedings of IEEE International Con-ference on Acoustics,Speech and Signal Processing.Washington D.C.,USA:IEEE
Press,2011:3428-3431.
(下转第176页)
(上接第169页)
[4]Wang Tianyu,Zhang Rongqing,Song Lingyang,et al.Power Allocation for Two-way Relay System Based on Sequential Second Price Auction[J].Wireless Personal Communications,2012,67(1):47-62.
[5]Walid S,Zhang Xiangyun,Behrouz M.Tree Formation with Physical Layer Security Considerations in Wireless Multi-hop Networks[J].IEEE Transactions on Wireless Communications,2012,11(11):1536-1276.
[6]洪颖,黄开枝,罗文宇,等.一种基于两次报价博弈机制的安全中继选择方法[J].信息工程大学学报,2014,15(5):1671-1673.
[7]Manchala D W.E-commerce Trust Metrics and Models[J].Internet Computing,2000,4(4):476-487.
[8]王博,陈训逊.Ad Hoc网络中一种基于信任模型的机会路由算法[J].通信学报,2013,34(9):92-104.
[9]Ahn J H,Lee T J.Multipoint Relay Selection for Robust Broadcast in Ad Hoc Networks[J].Ad Hoc Networks,2014,17(1):82-87.
[10]袁禄来,曾国荪,王伟. 基于Dempster-Shafer证据理论的信任评估模型[J].武汉大学学报:理学版,2006,52(5):627-630.
[11]Shankaran R,Varadharajan V,Orgun M,et al.Context-aware Trust Management for Peer-to-Peer Mobile Ad-hoc Networks[C]//Proceedings of the 33rd Annual IEEE Computer Software and Applications Conference.Washington D.C.,USA:IEEE
Press,2009:188-193.
[12]Wang Junshe,Li Xiaolong,Zhang Yun.Research of P2P Network Trust Model[C]//Proceedings of the 5th Inter-national Conference on Intelligent Human-machine Systems and Cybernetics.Nanjing,China:[s.n.],2013:70-73.
[13]Changiz R,Halabian H,Yu F R,et al.Trust Establish-ment in Cooperative Wireless Networks[C]//Proceedings of Military Communications Conference.Washington D.C.,USA:IEEE Press,2010:1074-1079.
[14]Jiang Jinfang,Han Guangjie,Wang Feng,et al.An Efficient Distributed Trust Model for Wireless Sensor Networks[J].IEEE Transactions on Parallel and Dis-tributed Systems,2015,26(5):1228-1237.
[15]周贤伟,吴启武.基于可信度的 MANET路由协议综合评估[J].计算机工程,2009,35(6):20-22.
[16]黄英,魏急波,雷菁.多节点协同中继信道容量分析及功率分配[J].解放军理工大学学报,2012,13(2):119-123.
编辑金胡考 |