[1]
|
BOLDRINI C, LEE K, ONEN M, et al. Opportunistic networks[J]. Computer Communications, 2014, 48(14): 1-4. |
[2]
|
吴大鹏, 张普宁, 王汝言. 带有消息投递概率估计的机会网络自适应缓存管理策略[J]. 电子与信息学报, 2014, 36(2): 390-395. |
[3]
|
WU Dapeng, ZHANG Puning, and WANG Ruyan. Adaptive buffer management strategy with message delivery probability estimating method in opportunistic networks[J]. Journal of Electronics Information Technology, 2014, 36(2): 390-395. |
[4]
|
吴大鹏, 白娜, 王汝言. 带有节点状态估计的间断连接无线网络缓存管理策略[J]. 电子与信息学报, 2015, 37(2): 443-448. |
[5]
|
WU Dapeng, BAI Na, and WANG Ruyan. Cache management mechanism with node status evaluation for intermittently connected wireless networks[J]. Journal of Electronics Information Technology, 2015, 37(2): 443-448. |
[6]
|
DSOUZA R J and JOSE J. Routing approaches in delay tolerant networks: a survey[J]. International Journal of Computer Applications, 2010, 1(17): 8-14. |
[7]
|
CAO Z, DONG M, GAO Z, et al. A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks[J]. IEEE Transactions on Parallel Distributed Systems, 2014, 25(1): 22-32. |
[8]
|
JAIN S. Black hole attack in delay tolerant networks: a survey[J]. International Journal of Computer Science and Engineering, 2014, 2(4): 172-175. |
[9]
|
DINI G and DUCA A L. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network[J]. Ad Hoc Networks, 2012, 10(7): 1167-1178. |
[10]
|
LI N and DAS S K. A trust-based framework for data forwarding in opportunistic networks[J]. Ad hoc Networks, 2013, 11(4): 1497-1509. |
[11]
|
LI F, WU J, and SRINIVASAN A. Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets[C]. IEEE International Conference on Computer Communications 2009, Rio de Janeiro, Brazil, 2009: 2428-2436. |
[12]
|
REN Y, CHUAH M C, YANG J, et al. Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording[C]. 2010 IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), Montreal, QC, Canada, 2010: 1-6. |
[13]
|
GUO Y, SCHILDT S, and WOLF L. Detecting blackhole and greyhole attacks in vehicular delay tolerant networks[C]. Fifth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, 2013: 1-7. |
[14]
|
SAINI K K, SAINI A, and MEHAK. Nature based trust security protocol against greyhole attacks in opportunistic networks[J]. International Journal of Engineering Research Management Technology, 2014, 1(3): 21-28. |
[15]
|
JULIER S J, UHLMANN J K, and DURRANT-WHYTE H F. A new approach for filtering nonlinear systems[C]. Proceedings of the 1995 American Control Conference, Seattle, WA, USA, 1995, 3: 1628-1632. |
[16]
|
BAADACHE A and BELMEHDI A. Struggling against simple and cooperative black hole attacks in multi-hop wireless Ad hoc networks[J]. Computer Networks, 2014, 73(1): 173-184. |
[17]
|
LI F and WU J. Mobility reduces uncertainty in MANETs[C]. 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 2007: 1946-1954. |
[18]
|
PAWLAK Z and SOWINSKI R. Rough set approach to multi- attribute decision analysis[J]. European Journal of Operational Research, 1994, 72(3): 443-459. |
[19]
|
LINDGREN A, DORIA A, and SCHEL?N O. PROPHET: probabilistic routing in intermittently connected networks[J]. Moble Computing and Communications Review, 2003, 7(3): 1246-1250. |
[20]
|
RAMANA K S, CHARI A A, and KASIVISWANTH N. A survey on trust management for mobile Ad hoc networks[J]. International Journal of Network Security and Its Applications, 2010, 13(4): 562-583. |