全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

利用信任模型构建安全路由协议

DOI: 10.13190/jbupt.201003.48.yuwk, PP. 48-51

Keywords: Ad,Hoc网络,安全,动态信任模型,路由协议,认证

Full-Text   Cite this paper   Add to My Lib

Abstract:

References

[1]  Komathy K, Narayanasamy P. Best neighbor strategy to enforce cooperation among selfish nodes in wireless Ad Hoc networks[J]. Computer Communications, 2007, 30(18): 3721-3735.
[2]  郑慧芳, 蒋挺, 周正. MANET增强合作模型的理论研究[J]. 北京邮电大学学报, 2008, 31(5): 1-4. Zheng Huifang, Jiang Ting, Zhou Zheng. Theoretical study with the model for MANET cooperation enforcement[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(5): 1-4.
[3]  Wang Yong, Attebury G, Ramamurthy B. A survey of security issues in wireless sensor networks[J]. IEEE Commun Surveys & Tutorials, 2006, 8(2): 2-23.
[4]  Song Shanshan, Hwang K, Zhou Runfang, et al. Trusted P2P transactions with fuzzy reputation aggregation[J]. IEEE Internet Computing, 2005, 9(6): 24-34.
[5]  Perkins C, Belding-Royer E, Das S. RFC 3561, Ad Hoc on-demand distance vector (AODV) routing[S], 2003.
[6]  张翔, 吴荣, 汪文勇. 无线移动Ad Hoc网络安全认证机制研究[J]. 电子科技大学学报, 2007, 36(6): 1437-1439. Zhang Xiang, Wu Rong, Wang Wenyong. Security and authentication mechanism research for mobile Ad Hoc network[J]. Journal of University of Electronic Science and Technology of China, 2007, 36(6): 1437-1439.
[7]  Josang A. A logic for uncertain probabilities[J]. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279-311.
[8]  Theodorakopoulos G, Baras J S. On trust models and trust evaluation metrics for Ad Hoc networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 318-328.
[9]  Yu Wei. Game theoretic analysis of cooperation stimulation and security in autonomous mobile Ad Hoc networks[J]. IEEE Trans on Mobile Computing, 2007, 6(5): 507-521.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133