共 18 条
[1]
Anderegg L., Ewenbenz S., Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents, Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 245-259, (2003)
[2]
Buchegger S., Boude J.L., Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 226-236, (2002)
[3]
Buttyan L., Hubaux J.P., Stimulating cooperation in self-organizing mobile ad hoc networks, ACM Mob. Netw. AppL, 5, pp. 579-592, (2003)
[4]
Chiamtac I., Conti M., Liu J.N., Mobile Ad Hoc networking: Imperatives and challenges, Ad Hoc NetWa., 1, pp. 13-64, (2003)
[5]
Felegyhazi M., Hubaux J.P., Butfyan L., Nash equilibria of packet forwarding strategies in wireless ad hoc networks, IEEE Trans. Mob. Comput., 5, pp. 463-476, (2006)
[6]
He Q., Wu D.P., Khosla F., SORI: A secure and objective reputation-based incentive scheme for adhoc networks, Proceedings of IEEE Wireless Communications and Networking Conference, pp. 825-830, (2004)
[7]
Li H.S., Li Z., ARM
[8]
An account-based hierarchical reputation management system for wireless ad hoc networks, Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, pp. 370-375, (2008)
[9]
Marti S., Gmi T.J., Lai K., Baker M., Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255-265, (2000)
[10]
Pircada A.A., McDonald C., Datta A., Performance Comparison of Trust-based Reactive Routing Protocols IEEE Irans Mobile Comput, 5, pp. 695-710, (2006)