[1] Yan Lindsay Sun, Wei Yu, Zhu Han, et al.Information theoretic framework of trust modeling and evaluation for Ad Hoc networks[J]. IEEE Journal on Selected Areasin Communications, 2006,24(2):305-317.
[2] Theodorakopoulos G, Baras J S. Trust evaluation in Ad-Hoc networks[C]// Proceedings of the 3rd ACM Workshop on Wireless Security. 2004:1-10.〖JY〗〖HT5”K〗(下转第205页)〖HT〗〖ZK)〗〖FL)0〗
[3] Theodorakopoulos G, Baras J S. On trust models and trust evaluation metrics for Ad-Hoc networks[J]. IEEE Journal on Selected Areas in Communications, 2006,24(2):318-328.
[4] Rachedi A, Benslimane A.Trust and mobility-based clustering algorithm for secure mobile Ad Hoc networks[C]// International Conference on Systems and Networks Communications, 2006. 2006:72.
[5] The University of Southern California. The Network Simulator-ns-2[DB/OL]. http://www.isi.edu/nsnam/ns, 2013-10-10.
[6] 郑少仁,王海涛,赵志峰,等. Ad Hoc网络技术[M]. 北京:人民邮电出版社, 2005.
[7] Govindan K, Mohapatra P.Trust computations and trust dynamics in mobile Ad hoc networks: A survey[J]. Communications Surveys & Tutorials, 2012,14(2):279-298.
[8] Shamir A. How to share a seeret[J].Communication of ACM, 1979,22(1):612-613.
[9] IEEE. EEE 802.15 Working Group for WPAN[DB/OL].http://grouper.ieee.org/groups/802/15, 2012-09-23.
[10]Zhou L, Hass Z J. Securing Ad Hoc netmorks[J]. IEEE Networks,1999,13(6):24-30.
[11]Mingliang Jiang, Jinyang Li, Yong Chiang Tay. Cluster Based Routing Protocol(CBRP) Functional Specification[R]. National University of Singapore, 1999.
[12]Gerla M, Tsai J T C. Muhicluster mobile multimedia radio network[J]. Wirelwss Networks, 1995,1(3):255-265.