References
[1]. S. Marsh, Formalising, (1994). 'Trust as a Computational
Concept', Ph.D. Thesis, Department of Mathematics and
Computer Science, University of Stirling.
[2]. C. E. Perkins and E. M. Royer, (1999). “Ad Hoc Ondemand
Distance Vector Routing,” In Proceedings of the
2nd IEEE Workshop on Mobile Computing Systems and
Applications, New Orleans, LA, 90-100.
[3]. Abolhasan M., Wysocki T., Dutkiewicz E (2004). 'A review
of routing protocols for mobile Adhoc networks', Adhoc
Networks, 1570-8705, Vol. 2, No. 1, pp. 1-22.
[4]. S. Marti, T.J. Giuli, K. Lai, M. Baker, (2000). Mitigating
routing misbehavior in mobile ad hoc networks,
Proceedings of the Sixth Annual International Conference
on Mobile Computing and Networking (MobiCom '00),
ACM, New York, NY, USA, pp. 255–265.
[5]. Pirzada A A, Datta A., McDonald C (2006). 'Incorporating trust and reputation in the DSR protocol for
dependable routing ', Elsevier – Computer
Communications, 0140-3664, Vol. 29 No. 15, pp.
2806–2821.
[6]. S. Buchegger, J-Y. Le Boudec, (2002). “Performance
analysis of the confidant protocol: cooperation of nodes –
fairness. Dynamic Ad-hoc networks”, Proceedings of
IEEE/ACM Symposium on Mobile Ad Hoc Networking and
Computing (MobiHOC), IEEE.
[7]. P. Michiardi, R. Molva, (2002). “Core: a collaborative
reputation mechanism to enforce node cooperation in
mobile ad hoc networks”, in: IFIP TC6/TC11 Sixth Joint
Working Conference on Communications and
Multimedia Security: Advanced Communications and
Multimedia Security, pp. 107–121.
[8]. Yahalom, B. Klein, T. Beth, (1993). 'Trust relationships in
secure systems – a distributed authentication perspective',
in: SP'93: Proceedings of the 1993 IEEE Symposium on
Security and Privacy, IEEE Computer Society, Washington, USA, pp. 150–164.
[9]. Zhou C V., Leckie C, Karunasekera S (2010). “A survey of
coordinated attacks and collaborative intrusion
detection”, Elsevier – Computers & Security, 0167-4048,
Vol. 29, No. 1, pp. 124–140.
[10]. S. Buchegger, J-Y. Le Boudec, (2003). “The effect of
rumor spreading in reputation systems in mobile ad-hoc
networks”, in: Wiopt-03: Modeling and Optimization in
Mobile, Ad Hoc and Wireless Networks, Sophia-Antipolis,
France.
[11]. Laura, (2000). “Energy Consumption Model for
performance analysis of routing protocols in MANET”,
Journal of mobile networks and application.
[12]. LIXin MIAO Jian –song, (2006). “A new traffic allocation
algorithm in AD hoc networks,“ The Journal of China
University of Post and Telecommunication, Vol. 13, No. 3.
[13]. Adnane A., BidanC, DeSousa R (2013). 'Trust based
security for OLSR routing protocol', Elsevier-Computer and
Communication, pp 1159–1171.