Trust-based minimum cost opportunistic routing for Ad hoc networks
暂无分享,去创建一个
[1] Wenjing Lou,et al. Multi-Rate Geographic Opportunistic Routing in Wireless Ad Hoc Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[2] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[3] Zhenyu Yang,et al. Opportunistic Routing in Multi-Radio Multi-Channel Multi-Hop Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[4] Lili Qiu,et al. SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks , 2009, IEEE Transactions on Mobile Computing.
[5] Jie Wu,et al. Opportunistic Routing Algebra and its Applications , 2009, IEEE INFOCOM 2009.
[6] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[7] Amitava Datta,et al. Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.
[8] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[9] Lachlan L. H. Andrew,et al. Opportunistic Source Coding for Data Gathering in Wireless Sensor Networks , 2007, MASS.
[10] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] Robert Tappan Morris,et al. a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.
[12] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[13] Chris Blondia,et al. Enabling cross layer design: adding the MadWifi extensions to Nsclick , 2007, Valuetools 2007.
[14] BERNARD M. WAXMAN,et al. Routing of multipoint connections , 1988, IEEE J. Sel. Areas Commun..
[15] Wenjing Lou,et al. On throughput efficiency of geographic opportunistic routing in multihop wireless networks , 2007, QSHINE.
[16] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[17] Yi Zhang,et al. Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).
[18] Tao Cui. Opportunistic Source Coding for Data Gathering in Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[19] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[20] EDDIE KOHLER,et al. The click modular router , 2000, TOCS.
[21] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[22] Muqing Wu,et al. A Priority Based Opportunistic Routing Mechanism for Real-Time Voice Service in Mobile Ad hoc Networks , 2010, Wirel. Pers. Commun..
[23] Weijia Jia,et al. Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[24] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[25] Joseph P. Macker,et al. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.
[26] Sachin Katti,et al. Trading structure for randomness in wireless opportunistic routing , 2007, SIGCOMM 2007.
[27] Antonio F. Gómez-Skarmeta,et al. PKI-based trust management in inter-domain scenarios , 2010, Comput. Secur..
[28] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[29] Matthias Grossglauser,et al. Least-Cost Opportunistic Routing , 2007 .
[30] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[31] Yacine Challal,et al. Reliable and fully distributed trust model for mobile ad hoc networks , 2009, Comput. Secur..
[32] Ruidong Li,et al. Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.
[33] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[34] Jie Wu,et al. Efficient Opportunistic Routing in Utility-Based Ad Hoc Networks , 2009, IEEE Transactions on Reliability.
[35] Robert Tappan Morris,et al. ExOR: opportunistic multi-hop routing for wireless networks , 2005, SIGCOMM '05.
[36] Xiaoqi Li,et al. A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).
[37] Hongqiang Zhai,et al. On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[38] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[39] Srihari Nelakuditi,et al. On the Efficacy of Opportunistic Routing , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[40] Ma Jian,et al. Opportunistic Routing Protocols for Wireless Multihop Networks , 2010 .
[41] Vladimiro Sassone,et al. An analysis of the exponential decay principle in probabilistic trust models , 2009, Theor. Comput. Sci..