共 50 条
[21]
Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks
[J].
IEEE ACCESS,
2024, 12
:95390-95401
[22]
Highly reliable trust establishment scheme in ad hoc networks
[J].
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING,
2004, 45 (06)
:687-699
[24]
Self-organized public-key management for mobile Ad Hoc Networks based on a bidirectional trust model
[J].
Wuhan Univ J Nat Sci,
2006, 1 (188-192)
:188-192
[25]
Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks
[J].
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS,
2016, 12 (07)
:1-16
[26]
Proposal and Its Evaluation of Neighbors Based Routing for ad hoc networks
[J].
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE,
2015, 2 (02)
:120-124
[27]
Interference Evaluation in CDMA Ad Hoc Networks
[J].
PROCEEDINGS OF THE IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2,
2006,
:962-965
[30]
A novel routing protocol based on an energy model in Ad Hoc Networks
[J].
2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8,
2009,
:2605-2608