Computer Science ›› 2015, Vol. 42 ›› Issue (8): 157-160.
Previous Articles Next Articles
WU Hai-qin and WANG Liang-min
[1] Fazio P,De Rango F,Lupia A.A new application for enhancing VANET services in emergency situations using the WAVE/802.11p standard[C]∥Wireless Days(WD),2013 IFIP.IEEE,2013:1-3 [2] 乔震,刘光杰,李季,等.移动自组织网络安全接入技术研究综述[J].计算机科学,2013,0(12):1-8,0 Qiao Zhen,Liu Guang-jie,Li Ji,et al.Survey on Secure Access Technology in Mobile Ad-hoc Network[J].Computer Science,2013,0(12):1-8,0 [3] Sharma S,Mishra R,Kaur I.New trust based security approach for ad-hoc networks[C]∥2010 3rd IEEE International Con-ference on Computer Science and Information Technology(ICCSIT).Chengdu,2010,9:428-431 [4] Xia H,Jia Z,Sha E H M.Research of trust model based on fuzzy theory in mobile ad hoc networks[J].IET Information Security,2013,8(2):88-103 [5] 陈深龙,张玉清.增强ad hoc网络可生存性的健壮多维信任模型[J].通信学报,2010(5):1-9 Chen Shen-long,Zhang Yu-qing.Robust multi-dimensional trust model for improving the survivability of ad hoc networks[J].Journal on Communications,2010(5):1-9 [6] Amaresh M,Usha G.Efficient malicious detection for AODV in mobile ad-hoc network[C]∥IEEE International Conference on Recent Trends in Information Technology(ICRTIT).Chennai,2013:263-269 [7] Bhoi S K,Nayak R P,Dash D,et al.RRP:A robust routing protocol for Vehicular Ad Hoc Network against hole generation attack[C]∥IEEE International Conference on Communications and Signal Processing(ICCSP).Melmaruvathur,2013:1175-1179 [8] Bao F,Chen R,Chang M J,et al.Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection[J].IEEE Transactions on Network and Service Management,2012,9(2):169-183 [9] Josang A,Knapskog S J.A metric for trusted systems[C]∥Proceeedings of the 21st National Security Conference.1998:16-29 [10] 胡玲珑,潘巨龙,崔慧.无线传感器网络中基于信誉的恶意节点检测方法[J].中国计量学院学报,2012,3(1):41-47 Hu Ling-long,Pan Ju-long,Cui Hui.A reputation-based method for detecting malicious nodes in WSNs[J].Journal of China Ji-liang University,2012,3(1):41-47 [11] Theodorakopoulos G,Baras J S.On trust models and trust eva-luation metrics for ad hoc networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):318-328 [12] Jiang T,Baras J S.Trust Evaluation in Anarchy:A Case Study on Autonomous Networks[C]∥INFOCOM.Barcelona,Spain,2006 [13] Ding Q,Li X,Jiang M,et al.Reputation-based trust model in vehicular ad hoc networks[C]∥IEEE International Conference on Wireless Communications and Signal Processing(WCSP).Suzhou,2010:1-6 [14] Saraswat D,Chaurasia B K.AHP Based Trust Model in VANETs[C]∥2013 5th International Conference on Computational Intelligence and Communication Networks(CICN).Mathura,2013:391-393 [15] 田俊峰,鲁玉臻,李宁.基于推荐的信任链管理模型[J].通信学报,2011,2(10):1-9 Tian Jun-feng,Lu Yu-zhen,Li Ning.Trust chain management model based on recommendation[J].Journal on Communications,2011,2(10):1-9 [16] Mui L.Computational models of trust and reputation:Agents,evolutionary games,and social networks[D].Cambridge:Massachusetts Institute of Technology,2002 [17] Dellarocas C.Reputation mechanism design in online trading environments with pure moral hazard[J].Information Systems Research,2005,16(2):209-230 [18] 王良民,郭渊博,詹永照.容忍入侵的无线传感器网络模糊信任评估模型[J].通信学报,2010,31(12):37-44 Wang Liang-min,Guo Yuan-bo,Zhan Yong-zhao.Fuzzy trust model for wireless sensor networks with intrusion tolerance[J].Journal on Communications,2010,31(12):37-44 |
No related articles found! |
|