REFERENCES
- [1] Hu, Y. and Perrig, A., “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,” Wireless Networks, Vol. 11, Issue 12, pp. 2138 (2005). doi: 10.1007/s11276-004-4744-y
- [2] Li, J., Li, R. and Kato, J., “Future Trust Management Framework for Mobile Ad Hoc Networks,” IEEE Communications Magazine, Vol. 46, No. 2, pp. 108 114 (2008). doi: 10.1109/MCOM.2008.4481349
- [3] Sun, Y. L., Han, Z. and Liu, K. J. R., “Defense of Trust Management Vulnerabilities in Distributed Networks,” IEEE Communications Magazine, Vol. 46, No. 2, pp. 112119 (2008). doi: 10.1109/MCOM.2008.4473092
- [4] Blaze, M., Feigenbaum, J. and Keromytis, A. D., “KeyNote: Trust Management for Public-Key Infrastructures,” in Security Protocols: 6th International Workshop Cambridge, UK, April 15-17, 1998: Proceedings. B. Christianson, B. Crispo, W. S. Harbison and M. Roe, Ed. London; Springer Berlin/Heidelberg, pp. 5963 (1998). doi: 10.1007/3-540-49135-X_9
- [5] Stajano, F. and Anderson, R. J., “The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks,” in Proceedings of the 7th International Workshop on Security Protocols, pp. 172194 (2000). doi: 10.1007/10720107_24
- [6] Sun, Y. L., Yu, W., Han, Z. and Liu, K. J. R., “Information Theoretic Framework of Trust Modelling and Evaluation for Ad Hoc Networks,” IEEE Journal of Selected Areas in Communications (J-SAC), Vol. 24, No. 2, pp. 305317 (2006). doi: 10.1109/JSAC. 2005.861389
- [7] Li, H. and Singhal, M., “Trust Management in Distributed Systems,” IEEE Computer Society, Vol. 40, pp. 4553 (2007). doi: 10.1109/MC.2007.76
- [8] Tuan, T. A., “A Game-Theoretic Analysis of Trust Management in P2P Systems,” in Proceedings of the First International Conference on Communications and Electronics (ICCE), pp. 130134 (2006). doi: 10.1109/CCE.2006.350832
- [9] Dai, H., Jia, Z. and Qin, Z., “Trust Evaluation and Dymanic Routing Decision Based on Fuzzy Theory for MANETs,” Journal of Software, Vol. 4, No. 10, pp. 10911101 (2009). doi: 10.4304/jsw.4.10.1091-1101
- [10] Guo, J., Marshall, A. and Zhou, B., “A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad Hoc Wireless Networks Using Fuzzy Sets and Grey Theory,” in Proceedings of IFIPTM 2011, IFIP ACIT 358, pp. 277289 (2011). doi: 10.1007/978-3-642-22200-9_22
- [11] Guo, J., Marshall, A. and Zhou, B., “A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks,” in Proceedings of IEEE TustCom-11, pp. 142149 (2011). doi: 10.1007/978-3-642-22200-9_22
- [12] Zapata, M. G. and Asokan, N., “Securing Ad Hoc Routing Protocols,” in Proceedings of ACM Workshop on Wireless Security WiSe ’02, pp. 110 (2002). doi: 10.1145/570681.570682
- [13] Hu, Y., Perrig, A. and Johnson, D. B., Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Journal of Wireless Networks, Vol. 11, No. 12, pp. 2138 (2005). doi: 10.1007/s11276-004- 4744-y
- [14] Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C. and Belding-Royer, E. M., “A Secure Routing Protocol for Ad Hoc Networks,” in Proceedings of 10th IEEE International Conference on Network Protocols 2002, pp. 7887 (2002). doi: 10.1109/ICNP.2002.1181388
- [15] Yang, H., Meng, X. and Lu, S., “Self-Organized Network-Layer Security in Mobile Ad Hoc Networks,” in Proceedings of the ACM Workshop on Wireless Security, WiSE ‘02, pp. 1120 (2002). doi: 10.1145/ 570681.570683
- [16] Hubaux, J., Buttyan, L. and Capkun, S., “The Quest for Security in Mobile Ad Hoc Networks,” in Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc ‘01, pp. 146155 (2001). doi: 10.1145/501416.501437
- [17] Capkun, S., Buttyan, L. and Hubaux, J., “Self-Organized Public-Key Management for Mobile Ad Hoc Networks,” IEEE Transactions on Mobile Computing, Vol. 2, No. 1, pp. 5264 (2003). doi: 10.1109/TMC. 2003.1195151
- [18] Agah, A., Das, S. K. and Basu, K., “A Non-Cooperative Game Approach for Intrusion Detection in Sensor Networks,” in Proceedings of IEEE 60th Vehicular Technology Conference 2004, VTC2004-Fall, pp. 2902 2906 (2004). doi: 10.1109/VETECF.2004.1400591
- [19] Li, H. and Singhal, M., “Trust Management in Distributed Systems,” Computer, Vol. 40, No. 2, pp. 45 53 (2007). doi: 10.1109/MC.2007.76
- [20] Eschenauer, L., Gligor, V. D. and Baras, J., “On Trust Establishment in Mobile Ad-Hoc Networks,” in Proceedings of the Security Protocols Workshop 2002, pp. 4766 (2002). doi: 10.1007/978-3-540-39871-4_6
- [21] Teng, Y., Phoha, V. V. and Choi, B., Design of Trust Metrics Based on Dempster Shafer Theory. URL http://citeseerx.ist.psu.edu/viewdoc/summary?doi= 10.1.1.21.8090 (2008).
- [22] Gray, E., Seigneur, J., Chen, Y. and Jensen, C., “Trust Propagation in Small Worlds,” in Proceedings of the 1st International Conference on Trust Management, iTrust’03, pp. 239254 (2003). doi: 10.1007/3-540- 44875-6_17
- [23] Jøsang, A., Artificial Reasoning with Subjective Logic (1997).
- [24] Jøsang, A., “A Logic for Uncertain Probabilities,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 9, No. 2, pp. 279311 (2001). doi: 10.1142/S0218488501000831
- [25] Buchegger, S. and Boudec, J., “Performance Analysis of the Confidant Protocol: Cooperation of Nodes - Fairness in Dynamic Ad-Hoc Networks,” in Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC ‘02 (2002). doi: 10.1145/513800.513828
- [26] Perkins, C. E. and Royer, E. M., “Ad-Hoc On-Demand Distance Vector Routing,” in Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications, WMCSA ‘99, pp. 90100 (1999). doi: 10.1109/MCSA.1999.749281
- [27] Johnson, D. B. and Maltz, D. A., “Dynamic Source Routing in Ad Hoc Wireless Networks,” in T. Imielinski and H. Korth, eds., Mobile Computing. Kluwer Academic Publishers, pp. 153181 (1996). doi: 10.1007/ 978-0-585-29603-6_5
- [28] Perkins, C. E. and Bhagwat, P., “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” in Proceedings of the Conference on Communications Architectures, Protocols and Applications, SIGCOMM ‘94, pp. 234244 (1994).doi: 10.1145/190314.190336
- [29] Li, X., Lyu, M. R. and Liu, J., “A Trust Model Based Routing Protocol for Secure Ad Hoc Networks,” in Proceedings of 2004 IEEE Aerospace Conference, pp. 12861295 (2004). doi: 10.1109/AERO.2004.1367726
- [30] Deng, J., Introduction to Grey Theory, Wuhan: Huazhong University of Science & Technology Press (2002).
- [31] Deng, J., A Course in Grey Systems, Wuhan: Huazhong University of Science and Technology Press (1990).
- [32] Song, Q. and Jamalipour, A., “Network Selection in an Integrated Wireless LAN and UMTS Environment Using Mathematical Modeling and Computing Techniques,” IEEE Wireless Communication, pp. 4248 (2005). doi: 10.1109/MWC.2005.1452853
- [33] Fu, C., Tang, F., Cui, Y., Liu, M. and Peng, B., “Grey Theory Based Nodes Risk Assessment in P2P Networks,” in Proceedings of 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 479483 (2009). doi: 10.1109/ ISPA.2009.45
- [34] Whittle, P., “On Principal Components and Least Square Methods of Factor Analysis,” Scandinavian Actuarial Journal, Vol. 1952, No. 34, pp. 223239 (1952).
- [35] Gerharz, M. and de Waal, C., “BonnMotion, a Mobility Scenario Generation and Analysis Tool,” Internet: https://net.cs.uni-bonn.de/fileadmin/ag/martini/ projekte/BonnMotion/src/BonnMotion_Docu.pdf (2012).
- [36] Saaty, T. L., “Decision Making with the Analytic Hierarchy Process,” International Journal of Services Sciences, Vol. 1, No. 1, pp. 8398 (2008). doi: 10. 1504/IJSSCI.2008.017590
- [37] Alonso, J. A. and Lamata, M. T., “Consistency in the Analytic Hierarchy Process: A New Approach,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 14, No. 4, pp. 445 459 (2006). doi: 10.1142/S0218488506004114
- [38] Liu, S. and Lin, Y., Grey Information: Theory and Practical Applications, London: Springer-Verlag (2006).