2KOK G X, CHOW C O, XU Y H, et al. Sensor-free route stability metric for mobile Ad Hoc networks[J]. Computer Networks, 2016, 100: 166-178.
3CARVALHO T, JENIOR J J, FRANCES R. A new cross-layer routing with energy awareness in hybrid mobile Ad Hoc networks: a fuzzy-based mechanism[J]. Simulation Modelling Practice and Theory, 2016, 63: 1-22.
4SARKAR S, DATTA R. A secure and energy-efficient stochastic multipath routing for self-organized mobile Ad Hoc networks[J]. Ad Hoc Networks, 2016, 37(2): 209-227.
5XIA Hut, YU Jia, TIAN Chengliang, et al. Light-weight trust-enhanced on-demand multi-path routing in mobile Ad Hoc networks[J]. Journal of Network and Computer Applications, 2016, 62: 112-127.
6NARULA P, DHURANDHER S K, MISRA S, et al. Security in mobile Ad Hoc networks using soft encryption and trust-based multi-path routing[J]. Computer Communications, 2008, 31(4): 760-769.
7KOMNINOS N, VERGADOS D D, DOULIGERIS C. Authentication in a layered security approach for mobile ad Hoc networks[J]. Computers & Security, 2007, 26(5): 373-380.
8FENG Li, LI Zili, ZHANG Yi. Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network[J]. Journal of Network and Computer Applications, 2009, 32(4): 781-787.
9VIJAYAKUMAR A, SELVAMANI K, KUMAR A P. Reputed packet delivery using efficient audit misbehaviour detection and monitoring method in mobile Ad Hoc networks[J]. Procedia Computer Science, 2015, 48: 489-496.
10KRISHNAN D. A distributed self-adaptive intrusion detection system for mobile Ad-Hoc networks using tamper evident mobile agents[J]. Procedia Computer Science, 2015, 46: 1203-1208.