[1] Sichitiu M L. Wireless mesh networks: opportunities and challenge
[C]//2005 Proceedings of World Wireless Congress. San Francisco, California, 2005: 562-567.
[2] Akyildiz I F, Wang X. Wireless mesh networks: a survey
[J]. Computer Networks, 2005, 47(5): 445-487.
[3] Hu Y C, Perrig A. A survey of secure wireless ad
hoc routing
[J]. IEEE Security and Privacy, 2004,
2(3): 28-39.
[4] Ding Xuyang, Luo Huiqiong. Trust evaluation based
reliable routing in wireless mesh network
[C] // 2007
International Conference on Wireless Communications,
Networking and Mobile Computing, WiCom
2007, 2007: 2294-2297.
[5] Josang A, Gray E, Kinateder M. Simplification
and analysis of transitive trust networks
[J]. Web
Intelligence and Agent Systems Journal, 2006, 4(2):
139-161.
[6] Mariti S, Guili T, Lai K, Baker M. Mitigating
routing misbehavior in mobile ad hoc networks
[C] //
2000 International Conference on Mobile Computing
and Networking, MobiCom, August 2000: 255-265.
[7] Buchegger S, Boudec J Y. Performance analysis
of the confidant protocol (cooperation of nodes:
fairness in dynamic ad-hoc networks)
[C] // 2002
IEEE/ACM Symposium on Mobile Ad Hoc Networking
and Computing, June 2002: 226-236.
[8] Michiardi P, Molva R. Core: a collaborative reputation
mechanism to enforce node cooperation in
mobile ad-hoc networks
[C] // 2002 Proceedings of
Communications and Multimedia Security Conference,
September, 2002: 278-290.
[9] Peng Shufeng, He Jingsha, Meng Yao. Reputationbased
trust update in network environment
[C]//2008 International Symposium on Electronic
Commerce and Security, Guangzhou, China, 2008:
118-123.
[10] Liu J S, Issarny V. Enhanced reputation mechanism
for mobile ad-hoc networks
[C]//2004 International
Conference on Trust Management (iTrust04),
Oxford, United Kingdom, 2004: 48-62.
[11] Li Xueming, Wang Jianke. A global trust model of
P2P network based on distance-weighted recommendation
[C] // 2009 IEEE International Conference on
Networking, Architecture, and Storage, Zhangjiajie,
Hunan, China, 2009: 281-284.
[12] 路松峰,刘芳,胡和平,刘巍峰.一种节点信誉相
关的P2P网络信任管理模型
[J]. 小型微型计算机系
统,2009, 30(11):2139-2145.
Lu Songfeng, Liu Fang, Hu Heping, Liu Weifeng.
Trust management model based on reputation of
nodes for P2P network
[J]. Journal of Chinese Computer
Systems, 2009, 30(11): 2139-2145. (in Chinese)
[13] Yan Sun, Zhu Han, Liu K J R. Defense of trust
management vulnerabilities in distributed networks
[J]. IEEE Communications Magazine, 2008, 46(2):
112-119.
[14] 王堃,吴蒙. P2P网络中一种可信任的全局信任模型
[J].
应用科学学报,2010, 28(3):237-245.
Wang Kun, Wu Meng. Trustworthy global reputation
model in peer-to-peer networks
[J]. Journal of
Applied Sciences, 2010, 28(3): 237-245. ( in Chinese)
[15] 王潮,应仲平,王海玲,林强. 基于蚁群算法的无线网
状网安全路由算法
[J]. 武汉大学学报:理学版,2009,
5(1): 105-108.
Wang Chao, Ying Zhongping, Wang Hailing, Lin
Qiang. Security routing algorithm for wireless mesh
network based on ant colony
[J]. Journal of Wuhan
University: Natural Science Edition, 2009, 5(1): 105-
108. ( in Chinese)
[16] Chen Dajun, Wang Chao, Lin Qiang. Ant-based
trusted routing algorithm for wireless mesh networks
[C]// 2009 Asia Pacific Conference on Postgraduate
Research in Microelectronics and Electronics,
PrimeAsia 2009, 2009: 53-56.
[17] 王堃,吴蒙,鲁蔚锋. 一种MANET中基于位置的可信
路由
[J]. 应用科学学报,2010, 28(5): 447-456.
Wang Kun, Wu Meng, Lu Weifeng. A Locationbased
trust routing for MANET
[J]. Journal of Applied
Sciences, 2010, 28(5): 447-456. (in Chinese)
[18] 余旺科,马文平,严亚俊,杨元原. 利用信任模型构
建安全路由协议
[J]. 北京邮电大学学报,2010,33(3):
48-51.
Yu Wangke, Ma Wenping, Yan Yajun, Yang
Yuanyuan. Constructing secure routing protocol using
trust model
[J]. Journal of Beijing University of
Posts and Telecommunications, 2010, 33(3): 48-51.
(in Chinese)
[19] Kim K, Shin K G. On accurate measurement of
link quality in multi-hop wireless mesh networks
[C]//2006 the 12th Annual International Conference
on Mobile Computing and Networking, MOBICOM
2006, 2006: 38-49.
[20] Perkins C E, Royer E M. Ad-hoc on-demanding
distance vector routing
[C]//1999 Proceedings of the
2nd IEEE Workshop on Mobile Computing Systems
and Applications(WMCSA’99), New Orleans, Los
Angles, February 1999: 90-100.
[21] Johnson D B, Maltz D A, Hu Y C. Dynamic source
routing protocol (DSR) in ad hoc networks
[M]. Dordrecht:
Kluwer Academic Publishers, 1999: 153-181.
[22] Perkins C E, Bhagwat P. Highly dynamic
destination-sequenced distance-vector routing
(DSDV) for mobile computers
[J]. ACM SIGCOMM
Computer Communication Review, 1994, 24(4):
234-244.
[23] Takeda S, Yagyu K, Aoki H, Matsumoto Y.
Multi-interface oriented radio metric on-demand
routing protocol for layer-2 mesh networks
[J]. IEIC
(Institute of Electronics, Information and Communication
Engineers) Technical Report, RCS2005-58,
Jul. 2005: 109-114.
[24] Bahr M. Update on the hybrid wireless mesh protocol
of IEEE 802.11s
[C]//2007 the 1st IEEE International
Workshop on Enabling Technologies and
Standards for Wireless Mesh Network (MeshTech),
Pisa, Italy, Oct. 2007: 1-10.
|