[1] |
YANG H,LUO H Y,YE F,et al. Security in mobile Ad Hoc networks:Challenges and solutions[J].IEEE Wireless Communications,2004,11(1):38-47.
|
[2] |
GUPTE S,SINGHAL M.Secure routing in mobile wireless Ad Hoc networks[J].Ad Hoc Networks,2003,1(1):151-174.
|
[3] |
KANNHAVONG B,NAKAYAMA H,NEMOTO Y,et al.A survey of routing attacks in mobile Ad Hoc networks[J].IEEE Wireless Communications,2007,14(5):85-91.
|
[4] |
ZAPATA M G.Secure Ad Hoc on-demand distance vector routing[J].ACM SIGMOBILE Mobile Computing and Communications Review,2002,6(3):106-107.
|
[5] |
HU Y C,PERRIG A,JOHNSON D B.Ariadne:A secure on-demand routing protocol for Ad Hoc networks[J].Wireless Networks,2005,11(1):21-38.
|
[6] |
HU Y C,JOHNSON D B,PERRIG A.SEAD:Secure efficient distance vector routing for mobile wireless Ad Hoc networks[J].Ad Hoc Networks,2003,1(1):175-192.
|
[7] |
付才,洪帆,洪亮,等.基于信任保留的移动Ad Hoc网络安全路由协议TPSRP[J].计算机学报,2007,30(10):1854-1864.FU C,HONG F,HONG L,et al.Mobile Ad Hoc secure routing protocol based on trust preserving[J].Chinese Journal of Computers,2007,30(10):1854-1864(in Chinese).
|
[8] |
BALAKRISHNAN V,VARADHARAJAN V,LUCS P,et al.Trust enhanced secure mobile Ad-Hoc network routing[C]//Proceedings of the 21st International Conference on Advanced Networking and Applications.Piscataway,NJ:IEEE Press,2007:27-33.
|
[9] |
ABUSALAH L,KHOKHAR A,GUIZANI M.A survey of secure mobile Ad Hoc routing protocols[J].IEEE Communications Surveys and Tutorials,2008,10(4):78-93.
|
[10] |
LI X,JIA Z,ZHANG P,et al.Trust-based on-demand multipath routing in mobile Ad Hoc networks[J].IET Information Security,2010,4(4):212-232.
|
[11] |
PERRONE L F,NELSON S C.A study of on-off attack models for wireless Ad Hoc networks[C]//Proceedings of 1st Workshop on Operator-Assisted(Wireless Mesh)Community Networks.Piscataway,NJ:IEEE Press,2006:58-67.
|
[12] |
USHIKUBO H,TAKEDA S,SHIGENO H.An effective secure routing protocol considering trust in mobile Ad Hoc networks[J].IPSJ Journal,2014,55(2):649-658.
|
[13] |
UMEDA S,TAKEDA S,SHIGENO H.Trust evaluation method adapted to node behavior for secure routing in mobile Ad Hoc networks[C]//Proceedings of 2015 8th International Conference on Mobile Computing and Ubiquitous Networking(ICMU).Berlin:Springer,2015:143-148.
|
[14] |
KUROSAWA S,NAKAYAMA H,KATO N,et al.Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method[J].International Journal of Network Security,2007,5(3):338-345.
|
[15] |
SEN J,CHANDRA M,HARIHARA S,et al.A mechanism for detection of grayhole attack in mobile Ad Hoc networks[C]//Proceedings of 2007 6th International Conference on Information,Communications and Signal Processing.Piscataway,NJ:IEEE Press,2007:1-5.
|
[16] |
GHOSH T,PISSINOU N,MAKKI K.Collaborative trust-based secure routing against colluding malicious nodes in multi-hop Ad Hoc networks[C]//Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks(LCN'04).Piscataway,NJ:IEEE Press,2004:224-231.
|
[17] |
CHENG Y,HUANG C,SHI W.Trusted dynamic source routing protocol[C]//Proceedings of the 3rd International Conference on Wireless Communications,Networking and Mobile Computing.Piscataway,NJ:IEEE Press,2007:1632-1636.
|