共 21 条
- [1] Darshana P., Vandana V., Security enhancement of AODV protocol for mobile ad hoc network, International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2, 1, pp. 317-321, (2013)
- [2] Zhu Y., Xu B., Shi X.H., Et al., A Survey of social-based routing in delay tolerant networks: Positive and negative social effects, IEEE Communications Surveys & Tutorials, 15, 1, pp. 387-401, (2013)
- [3] Manam V.K.C., Mahendran V., Murthy C.S.R., Performance modeling of DTN routing with heterogeneous and selfish nodes, Wireless Networks, 20, 1, pp. 25-40, (2014)
- [4] Li Y., Su G., Wang Z., Evaluating the effects of node cooperation on DTN routing, AEU-International Journal of Electronics and Communications, 66, 1, pp. 62-67, (2012)
- [5] Resta G., Santi P., A framework for routing performance analysis in delay tolerant networks with application to noncooperative networks, IEEE Transactions on Parallel and Distributed Systems, 23, 1, pp. 2-10, (2012)
- [6] Zhu H., Du S., Gao Z., Et al., A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks, IEEE Transactions on Parallel and Distributed Systems, 25, 1, pp. 22-32, (2014)
- [7] Anusha T., Rao N.S., Improving the trust and adversary detection process for delay-tolerant networks, International Journal of Computer Science and Mobile Applications, 1, 5, pp. 44-50, (2013)
- [8] Govindan K., Mohapatra P., Trust computations and trust dynamics in mobile adhoc networks: A survey, IEEE Communications Surveys & Tutorials, 14, 2, pp. 279-298, (2012)
- [9] Wang X., Liu L., Su J., Rlm: A general model for trust representation and aggregation, IEEE Transactions on Services Computing, 5, 1, pp. 131-143, (2012)
- [10] Li F., Wu J., Srinivasan A., Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets, IEEE INFOCOM 2009, pp. 2428-2436, (2009)