[1] YANG H,LUO H Y,YE F,et al. Security in mobile Ad Hoc networks:Challenges and solutions[J].IEEE Wireless Communications,2004,11(1):38-47.
[2] GUPTE S,SINGHAL M.Secure routing in mobile wireless Ad Hoc networks[J].Ad Hoc Networks,2003,1(1):151-174.
[3] KANNHAVONG B,NAKAYAMA H,NEMOTO Y,et al.A survey of routing attacks in mobile Ad Hoc networks[J].IEEE Wireless Communications,2007,14(5):85-91.
[4] ZAPATA M G.Secure Ad Hoc on-demand distance vector routing[J].ACM SIGMOBILE Mobile Computing and Communications Review,2002,6(3):106-107.
[5] HU Y C,PERRIG A,JOHNSON D B.Ariadne:A secure on-demand routing protocol for Ad Hoc networks[J].Wireless Networks,2005,11(1):21-38.
[6] HU Y C,JOHNSON D B,PERRIG A.SEAD:Secure efficient distance vector routing for mobile wireless Ad Hoc networks[J].Ad Hoc Networks,2003,1(1):175-192.
[7] 付才,洪帆,洪亮,等.基于信任保留的移动Ad Hoc网络安全路由协议TPSRP[J].计算机学报,2007,30(10):1854-1864.FU C,HONG F,HONG L,et al.Mobile Ad Hoc secure routing protocol based on trust preserving[J].Chinese Journal of Computers,2007,30(10):1854-1864(in Chinese).
[8] BALAKRISHNAN V,VARADHARAJAN V,LUCS P,et al.Trust enhanced secure mobile Ad-Hoc network routing[C]//Proceedings of the 21st International Conference on Advanced Networking and Applications.Piscataway,NJ:IEEE Press,2007:27-33.
[9] ABUSALAH L,KHOKHAR A,GUIZANI M.A survey of secure mobile Ad Hoc routing protocols[J].IEEE Communications Surveys and Tutorials,2008,10(4):78-93.
[10] LI X,JIA Z,ZHANG P,et al.Trust-based on-demand multipath routing in mobile Ad Hoc networks[J].IET Information Security,2010,4(4):212-232.
[11] PERRONE L F,NELSON S C.A study of on-off attack models for wireless Ad Hoc networks[C]//Proceedings of 1st Workshop on Operator-Assisted(Wireless Mesh)Community Networks.Piscataway,NJ:IEEE Press,2006:58-67.
[12] USHIKUBO H,TAKEDA S,SHIGENO H.An effective secure routing protocol considering trust in mobile Ad Hoc networks[J].IPSJ Journal,2014,55(2):649-658.
[13] UMEDA S,TAKEDA S,SHIGENO H.Trust evaluation method adapted to node behavior for secure routing in mobile Ad Hoc networks[C]//Proceedings of 2015 8th International Conference on Mobile Computing and Ubiquitous Networking(ICMU).Berlin:Springer,2015:143-148.
[14] KUROSAWA S,NAKAYAMA H,KATO N,et al.Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method[J].International Journal of Network Security,2007,5(3):338-345.
[15] SEN J,CHANDRA M,HARIHARA S,et al.A mechanism for detection of grayhole attack in mobile Ad Hoc networks[C]//Proceedings of 2007 6th International Conference on Information,Communications and Signal Processing.Piscataway,NJ:IEEE Press,2007:1-5.
[16] GHOSH T,PISSINOU N,MAKKI K.Collaborative trust-based secure routing against colluding malicious nodes in multi-hop Ad Hoc networks[C]//Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks(LCN'04).Piscataway,NJ:IEEE Press,2004:224-231.
[17] CHENG Y,HUANG C,SHI W.Trusted dynamic source routing protocol[C]//Proceedings of the 3rd International Conference on Wireless Communications,Networking and Mobile Computing.Piscataway,NJ:IEEE Press,2007:1632-1636. |