Sung Sul-yun.[J].Seo Yuh-wa, and Shin Yong-tae. Hierarchical clustering algorithm based on mobility in mobile Ad hoc networks [C]. 2006 International Conference on Computational Science and its Applications (ICCSA2006), Scotland, UK.2006,:-[2]Elhdhili M E, Azzouz L B, and Kamoun F. CASAN: Clustering algorithm for security in Ad hoc networks [J].Computer Communication.2008, 31(13):2972-2980[3]胡华平, 胡光明, 董攀, 等. 大规模移动自组网络安全技术综述[J]. 计算机研究与发展, 2007, 44(4): 545-552.Hu Hua-ping, Hu Guang-ming, and Dong Pan, et al.. Survey of security technology for large scale MANET[J].Journal of Computer Research and Development.2007, 44(4):545-552[4]李小勇, 桂小林. 大规模分布式环境下动态信任模型研究[J]. 软件学报, 2007 , 16(6): 1510-1521.[5]Li Xiao-yong and Gui Xiao-lin. Research on dynamic trust model for large scale distributed environment[J]. Journal of Software, 2007, 16(6): 1510-1521.[6]Mundinger J and Boudec J L. Analysis of a reputation system for mobile Ad-hoc networks with liars[J].Performance Evaluation.2008, 65(3/4):212-226[7]肖德琴, 冯健昭, 周权, 等. 基于高斯分布的传感器网络信誉模型[J]. 通信学报, 2008, 29(3): 47-53.Xiao De-qin, Feng Jian-zhao, and Zhou Quan, et al.. Gauss reputation framework for sensor networks[J]. Journal on Communications, 2008, 29(3): 47-53.[8]Otrok H, Mohammed N, and Wang Ling-yu, et al.. A game-theoretic intrusion detection model for mobile Ad hoc networks [J].Computer Communications.2008, 31(4):708-721[9]钱海, 马建辉, 王旭法. 一种新的免疫协同多Agent模型及其仿真分析[J]. 系统仿真学报, 2008, 20(13): 3436-3439.Qian Hai, Ma Jian-hui, and Wang Xu-fa. Novel immune cooperative multi-agent model and its simulation analyses[J]. Journal of System Simulation, 2008, 20(13): 3436-3439.[10]鲍宇, 曾国荪, 曾连荪, 等. P2P网络中防止欺骗行为的一种信任度计算方法[J]. 通信学报, 2008, 29(10): 215-222.Bao Yu, Zeng Guo-sun, and Zeng Lian-sun, et al.. Reputation based on new metric in P2P network[J]. Journal on Communications, 2008, 29(10): 215-222.[11]Yu Yao, Guo Lei, and Wang Xing-wei, et al.. A new node role-based reputation model in hierarchial Ad hoc networks[C]. International Joint Conference on INC, IMS and IDC, Seoul, Korea, 2009: 457-461.[12]Ganeriwal S and Srivastava M B. Reputation-based framework for high integrity sensor networks [C]. Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks, Washington, DC, USA, 2004: 66-77.
|