相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks
Yanwei Wang et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2014)
Trust establishment in cooperative wireless relaying networks
Reyhaneh Changiz et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2014)
Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks
F. Richard Yu et al.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2013)
Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications
Quansheng Guan et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2012)
Light-weight trust-based routing protocol for mobile ad hoc networks
N. Marchang et al.
IET INFORMATION SECURITY (2012)
A Survey on Trust Management for Mobile Ad Hoc Networks
Jin-Hee Cho et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2011)
Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks
Shengrong Bu et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2011)
Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks
Shengrong Bu et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2011)
AOS: an anonymous overlay system for mobile ad hoc networks
Rui Zhang et al.
WIRELESS NETWORKS (2011)
Biologically Inspired Consensus-Based Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios
F. Richard Yu et al.
IEEE NETWORK (2010)
A Survey of Trust and Reputation Management Systems in Wireless Communications
Han Yu et al.
PROCEEDINGS OF THE IEEE (2010)
A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks
F. Richard Yu et al.
IEEE Transactions on Network and Service Management (2010)
SECURING RESOURCE-CONSTRAINED WIRELESS AD HOC NETWORKS
Yuguang Fang et al.
IEEE WIRELESS COMMUNICATIONS (2009)
SPREAD: Improving network security by multipath routing in mobile ad hoc networks
Wenjing Lou et al.
WIRELESS NETWORKS (2009)
Securing mobile ad hoc networks with certificateless public keys
Yanchao Zhang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2006)
Dempster-Shafer theory for intrusion detection in ad hoc networks
TM Chen et al.
IEEE INTERNET COMPUTING (2005)
Intrusion detection in wireless ad hoc networks
A Mishra et al.
IEEE WIRELESS COMMUNICATIONS (2004)
Routing security in wireless ad hoc networks
HM Deng et al.
IEEE COMMUNICATIONS MAGAZINE (2002)