2HU Y C,PERRIG A,JOHNSON D B.Rushing attacks and defense in wireless ad hoc network routing protocols[A].Proceedings of the 2003 ACM workshop on Wireless Scettrity[C].2003.30-40.
3HU Y C,PERRIG A,JOHNSON D B.Ariadne:a secure on-demand muting protocol for ad hoc networks[J].Wireless Networks,2005,11(1):21-38.
4CARVALHO M.Security in mobile ad hoc networks[J].IEEE Security & Privacy,2008,6(2):72-75.
5DJENOURI D,KHELLADI L,BADACHE A N.A survey of security issues in mobile ad hoc and sensor networks[J].IEEE Communications Surveys & Tutorials,2005.7(4):2-28.
6MARTI S,GIULITJ,LAIK et al.Mitigating muting misbehavior in mobile ad hoc networks[A].Proceedings of the 6th Annual Intemational Conference on Mobile Computing and Networking[C].2000.255-265.
7BUCHEGGER S,BOUDEC J Y L.Performance analysis of the confidant protocol[A].Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing[C].2002.226-236.
8MICHIARDI P,MOLVA R CORE:a collaborative reputation mechanism to enforce node cooperation mobile ad hoc networks[A].Proceedings of the IFIPTC6/TC11 Sixth Joint Working Conference On Communications and Multimedia Security[C].2002.107-121.
9OLIVIERO F,ROMANO S P.A reputation-based metric for secure routing in wireless mesh networks[A].IEEE Global Telecommunications Conference[C].2008.1-5.
10BALAKRISHNAN V,VADHARAJAN V,TUPAKULA U.Subjective logic based trust model for mobile ad hoc networks[A].Proceedings of the 4th Intemational Conferece on Security and Privacy in Communication Netowrks[C].2008.1-11.