Citation: | GUO Yuanbo, MA Jianfeng, WANG Chao, et al., “Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs,” Chinese Journal of Electronics, vol. 22, no. 4, pp. 820-825, 2013, |
G. Xudong, X. Yan, L. Qiwei, et al., “A Trusted Ad Hoc Routing Protocol Based on Fuzzy Mathematics”, Chinese Journal of Electronics, Vol.22, No.1, pp.155-159, 2013.
|
L. Zhou and Z. Haas, “Securing ad hoc networks”, IEEE Network,Vol.13, No.6, pp.24-30, 1999.
|
B. Zhu, F. Bao, R.H. Deng, M.S. Kankanhalli and G. Wang,“Efficient and robust key management for large mobile adh oc networks”, Computer Networks, Vol.48, No.4, pp.657-682,2 005.
|
S. Raghani, D. Toshniwal and R. Joshi, “Dynamic support ford istributed certification authority in mobile ad hoc networks”, Proceedings of the 2006 International Conference on HybridI nformation Technology-Volume 01, Washington, DC, USA,p p.424-432, 2006.
|
A.Z. Ghalwash, A.A.A. Youssif, S.M. Hashad and R. Doss,“Self adjusted security architecture for mobile ad hoc networksM ANETs”, 6th Annual IEEE/ACIS International Conferenceo n Computer and Information Science, pp.682-687, 2007.
|
K. Hamouid and K. Adi, “Secure and robust threshold key management( SRKM) scheme for ad hoc networks”, Security and Communication Networks, Vol.3, No.6, pp.517-534, 2010.
|
F.R. Yu and H. Tang, “Distributed node selection for thresholdk ey management with intrusion detection in mobile ad hoc networks”,W ireless Networks, Vol.16, No.8, pp.2169-2178, 2010.
|
A. Mas-Colell, M.D. Whinston and J.R. Green, MicroeconomicT heory, Oxford: Oxford University Press, 1995.
|
L. Anderegg and S. Eidenbenz, “Ad hoc-VCG: a truthful andc ost-efficient routing protocol for mobile ad hoc networks withs elfish agents”, Proceedings of the 9th annual international conferenceo n Mobile computing and networking, New York, NY,U SA, pp.245-259, 2003.
|
Y. Wang and M. Singhal, “On improving the efficiency of truthfulr outing in MANETs with selfish nodes”, Pervasive and Mobile Computing, Vol.3, No.5, pp.537-559, 2007.
|
A. Rachedi, A. Benslimane, H. Otrok, N. Mohammed and M.D ebbabi, “A Secure mechanism design-based and game theoreticalm odel for MANETs”, Mobile Networks and Applications,Vol.15, No.2, pp.191-204, 2010.
|
N. Mohammed, H. Otrok, L. Wang, M. Debbabi and P. Bhattacharya,“Mechanism design based secure leader election modelf or intrusion detection in MANET”, IEEE Transactions on Dependable and Secure Computing, Vol.8, No.1, pp.89-103, 2011.
|
Leonid Hurwicz and Stanley Reiter, Designing Economic Mechanisms,1 st ed. Cambridge: Cambridge University Press, 2008.
|
H. Garcia-Molina, “Elections in a distributed computing system”,I EEE Transactions on Computers, Vol.C-31, No.1,p p.48-59, 1982.
|
A. Derhab and N. Badache, “A self-stabilizing leader electiona lgorithm in highly dynamic ad hoc mobile networks”, IEEET ransactions on Parallel and Distributed Systems, Vol.19, No.7,p p.926-939, 2008
|
P. Hu, Z. Zhou, Q. Liu and F. Li, “The HMM-based modelingf or the energy level prediction in wireless sensor networks”, 2ndI EEE Conference on Industrial Electronics and Applications,p p.2253-2258, 2007.
|
K. Miettinen, Non Linear Multi-objective Optimization, Norwell:Kluwer Academic Publisers, 1999.
|