[1] Akyildiz I F, Wang X, Wang W. Wireless Mesh Networks: a Survey[J]. Computer Networks, 2005, 47(4): 445-487.
[2] Lou Wenjing, Ren Kui. Security, Privacy, and Accountability in Wireless Access Networks [J]. IEEE Wireless Communications Magazine, 2009, 16(4): 80-87.
[3] Wan Zhiguo, Ren Kui, Zhu Bo, et al. Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks [J]. IEEE Transactions on Vehicular Technology, 2010, 59(2): 519-532.
[4] Li Na, Zhang Nan, Das S K, et al. Privacy Preservation in Wireless Sensor Networks: a State-of-the-art Survey [J]. Ad Hoc Networks, 2009, 7(8): 1501-1514.
[5] Islam M S, Hamid M A, Hong C S. SHWMP: a Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks [J]. Transactions on Computational Science Ⅵ, 2009, 5730: 95-114.
[6] Lin Hui, Ma Jianfeng, Hu Jia, et al. PA-SHWMP: a Privacy-aware Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks [J]. EURASIP Journal on Wireless Communications and Networking, 2012: 69.
[7] Lin Hui, Hu Jia, Ma Jianfeng, et al. A Role Based Privacy-aware Secure Routing Protocol for Wireless Mesh Networks [J]. Wireless Personal Communications, 2013: 1-23.
[8] Islam M S, Yoon Y J, Hamid M A, et al. A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network [C]//Lecture Notes in Computer Science. Heidelberg: Springer Verlag, 2008: 972-985.
[9] Michiardi P, Molva R. Core: a Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks [C]//Advanced Communications and Multimedia Security. Norwell: Kluwer Academic Publishers, 2002: 107-121.
[10] Zhang Zonghua, Ho P H, Nat-Abdesselam F. RADAR: a Reputation-driven Anomaly Detection System for Wireless Mesh Networks [J]. Wireless Networks, 2010,16(8): 2221-2236.
[11] Li Ze, Shen Haiying. A Hierarchical Account-aided Reputation Management System for Large-Scale MANETs [C]//Proceedings of IEEE INFOCOM. Piscataway: IEEE, 2011: 909-917.
[12] Laniepce S, Lancieri L, Achemlal M, et al. A Cross-Layer Reputation System for Routing Non-Cooperation Effects Mitigation Within Hybrid Ad-Hoc Networks [C]//Proceedings of IWCMC. New York: ACM, 2010: 296-300.
[13] Khan S, Alrajeh N A, Loo K K. Secure Route Selection in Wireless Mesh Networks [J]. Computer Networks, 2012, 56(2): 491-503.
[14] Paris S, Nita-Rotaru C, Martignon F, et al. EFW: a Cross-Layer Metric for Reliable Routing in Wireless Mesh Networks with Selfish Participants [C]//Proceedings of IEEE INFOCOM. Pisataway: IEEE, 2011: 576-580.
[15] Silva H, Holanda R, Nogueira M, et al. A Cross-layer and Adaptive Scheme for Balancing Performance and Security on WMN Data Routing [C]//Proceedings of Global Telecommunications Conference. New York: IEEE, 2010:1-5.
[16] Khan S, Loo J. Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks [J]. Wireless Personal Communications, 2012, 62(1): 201-214.
[17] Lu W P, Sundareshan M K. A Model for Multilevel Security in Computer Networks [J]. IEEE Transactions on Software Engineering, 1990, 16(6): 647-659.
[18] Kane P, Browne P C. Using Uncertainty in Reputation Methods to Enforce Cooperation in Ad-hoc Networks [C]//Proceedings of the 5th ACM Workshop on Wireless Security. New York: ACM, 2006:105-113.
[19] Liu Yining, Li Keqiu, Jin Yingwei, et al. A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks [J]. Future Generation Computer Systems, 2011, 27(5): 547-554.
[20] 杨凯. 无线 Mesh 网络高性能路由协议研究[D]. 西安: 西安电子科技大学, 2011.
[21] IEEE 802.11s Task Group. Draft Amendment to Standard for Information Technology Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment: ESS Mesh Networking [S]. IEEE P802.11s/D3.02, May 2009. |