Karlof C and Wagner D. Secure routing in wireless sensornetworks: attacks and countermeasures [C]. IEEEInternational Workshop on sensor Network Protocols andApplications, California Univ., Berkeley, CA, USA, 2003:113-127.[2]Rebahi Y, Mujica-V V E, and Sisalem D. A reputation-basedtrust mechanism for ad hoc networks [C]. Proc. 10th IEEESymposium on Computers and Communications, FraunhoferFokus, Germany, 2005: 37-42.[3]Sun Y L, Han Z, and Yu W, et al.. Attacks on trustevaluation in distributed networks [C]. IEEE Conference onInformation Sciences and Systems, CLSS 2006-Proceedings,Rhode Island Univ., Kingston, RI, 2007: 1461-1466.[4]Tuptuk N and Lupu E. Risk based authorisation for mobilead hoc networks [J]. Lecture Notes in Computer Science,Springer-verlag, 2007, 4543: 188-191.[5]Rabadi N M and Mahmud S M. Privacy protection amongdrivers in vehicle-to-vehicle communication networks [C]. 4thAnnual IEEE Consumer Communications and NetworkingConference, CCNC2007, Las Vegas, NV, USA, 2007:281-286.[6]Papapanaqiotou K, Marias G F, and Georqiadis P et al..Performance evaluation of a distributed OCSP protocol overMANETs [C]. 3rd IEEE Consumer Communications andNetworking Conference, Piscataway, NJ, USA, 2006, 1: 1-5.[7]Wang L N, Shi D J, and Qin B P, et al.. Clustering-basedmerkel hash tree entity authentication scheme [J]. ChineseJournal of Sensors and Actuators, 2007, 20(6): 1338-1343.[8]Munoz J L, Forne J, and Esparza O, et al.. Efficientcertificate revocation system implementation: huffmanmerkle hash tree (HuffMHT) [J]. Springer-Verlag BerlinHeidelberg, LNCS, 2005, 3592: 119-127.[9]Aboudagga N, Refaei M T, and Eltoweissy M.Authentication protocols for ad hoc networks: taxonomy andresearch issues [C]. International Workshop on ModelingAnalysis and Simulation of Wireless and Mobile Systems,Montreal, Quebec, Canada, 2005: 96-104.[10]Hu W, Chou C T, and Jha S, et al.. Deploying long-lived andcost-effective hybrid sensor networks [J].Ad hoc Networks.2006, 4(6):749-767[11]Korte B and Vygen J. Combinatorial Optimization Theoryand Algorithms (Fourth Edition) [M]. Springer-Verlag BerlinHeidelberg, 2008: 527-529.[12]Skold M, Yeongyoon C, and Nilsson J. An analysis of mobileradio Ad hoc networks using cluster architectures [C]. 57thIEEE Vehicular Technology Conference, Swedish DefenceRes. Agency, Linkoping, Sweden, 2003, 1: 181-185.[13]Chiasserini C F, Chlamtac I, and Monti P, et al.. Anenergy-efficient method for nodes assignment in cluster-basedad hoc networks [J].Wireless Networks.2004, 10(3):223-231[14]Heinzelman W B, Chandrakasan A P, and Balakrishnan H.An application-specific protocol architecture for wirelessmicrosensor networks [J]. IEEE Transactions on WirelessCommunications, 2002, 1(4): 660-670.[15]叶银法, 陆健贤, 罗丽等. WCDMA 系统工程手册[M]. 机械工业出版社, 2006: 470-471.Ye Y F, Lu J X, and Luo L, et al.. Handbook of WCMASystem Engineering [M]. China Machine Press, 2006:470-471.
|