2Pelusi L,Passarella A,Conti M. Opportunistic networking:Data forwarding in disconnected mobile ad hoc networks[J].IEEE Communications Magazine,2006,(11):134-141.doi:10.1109/MCOM.2006.248176.
3Jun H,Ammar M,Corner M. Hierachical power management in disruption tolerant networks with traffic-aware optimization[A].New York:ACM,2006.245-252.
4Krifa A,Barakat C,Spyropoulos T. Optimal buffer management policies for delay tolerant networks[A].Piscataway,NJ:IEEE,2006.260-268.
5Hong X,Huang D,Gerla M. SAT:Situation-aware trust architecture for vehicular networks[A].New York:ACM,2008.31-36.
6Miranda H,Rodrigues L. Reputation in anonymous vehicular networks[J].Int Journal of Autonomous and Adaptive Communications Systems,2010,(02):178-197.
7Zhou L,Hass Z. Securing ad hoc networks[J].IEEE Transactions on Networking,1999,(06):24-29.
8Hu Y,Perrig A,Johnson D. Ariadne:A secure on-demand routing protocol for ad hoe networks[A].New York:ACM,2002.12-23.
9Theodorakopoulos G,Baras J. Trust evaluation in ad-hoc networks[A].New York:ACM,2004.1-10.
10Yang H,Luo H,Ye F. Security in mobile ad hoc networks:Challenges and solutions[J].IEEE Transactions on Wireless Communications,2004,(01):38-47.