Prayag N, Sanjay Kumar D, and Sudip M, et al.. Security inmobile Ad-hoc networks using soft encryption andtrust-based multi-path routing [J]. ComputerCommunications, 2008, 31(4): 760-769.[2]Vasantha V and Manimegalai D. Mitigating routingmisbehaviors using subjective trust model in mobile Ad hocnetworks [C]. International Conference on ComputationalIntelligence and Multimedia Applications, Sivakasi, TamilNadu, India, December 13-15, 2007: 417-422.Neeraj N, Patel R B, and Bhat V K. Trust aware routing withload balancing in ad hoc network using mobile agent [C]. 15thInternational Conference on Advanced Computing andCommunications, Guwahati, India, December 18-21, 2007:454-459.[3]Wang Kun, Wu Meng, and Shen Su bin. A trust evaluationmethod for node cooperation in mobile ad hoc networks [C].5th International Conference on Information Technology,Nevada, USA, April 7-9, 2008: 1000-1005.[4]Bounpadith, Hidehisa N, and Nei K, et al.. A study of arouting attack in OLSR-based mobile ad hoc networks [J].International Journal of Communication Systems.2007,20(11):1245-1261[5]Satyanarayana A. Unified formula for analysis of somenetwork reliability problems [J].IEEE Transactions onReliability.1982, R-31(1):23-32[6]Kannhavong Bounpadith, Nakayama Hidehisa, and NemotoYoshiaki, et al.. A survey of routing attacks in mobile Ad hocnetworks[J].IEEE Wireless Communications.2007, 14(5):85-91[7]Katsuhiko O. System Dynamics (Fourth Edition) [M]. NewJersey, Prentice Hall, August 23, 2003: 350-480.[8]Andel Todd R and Yasinsac Alec. Adaptive threat modelingfor secure Ad hoc routing protocols [J]. Electronic Notes inTheoretical Computer Science, 2008, 197(2): 3-14.[9]Zouridaki Charikleia, Brian M L, and Marek H. Byzantinerobust trust establishment for mobile Ad hoc networks [J].Telecommunication Systems.2007, 35(3-4):189-206[10]Zheng Long and Zhou J L. Optimization of militarytransportation path based on generalized cut set algorithm[J]. Computer Engineering, 2007, 33(11): 4-9.[11]Zheng Long, Liu Xue, and Zhou Jing lun. Frequency-domainreliability analysis and modeling of networked controlsystems [C]. Third International Workshop on FeedbackControl Implementation and Design in Computing Systemsand Networks, Annapolis, Maryland, USA, June 6, 2008:35-40.[12]Carlos R H and Thomas K. A mutual networksynchronization method for wireless Ad hoc and sensornetworks [J].IEEE Transactions on Mobile Computing.2008,7(5):633-645
|