1 |
L. Hanzo and R. Tafazolli, "A survey of QoS routing solutions for mobile ad-hoc network," Journal of IEEE Communications Surveys & Tutorials, vol. 9, no. 2, pp. 50-70, July 2007. DOI: 10.1109/COMST.2007.382407.
|
2 |
Y. Xu, J. Liu, O. Takahashi, N. Shiratori, and X. Jiang, "SOQR: Secure optimal QoS routing in wireless ad hoc networks," in Proc. 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA pp. 1-6, Mar.19-22, 2017. DOI: 10.1109/WCNC.2017.7925687
|
3 |
Z. Liang and W. Shi, "Enforcing cooperation resource sharing in untrusted P2P computing environment," Journal of Mobile Networks and Applications, vol. 10, no. 6, pp. 971-983, October 2005. DOI:10.1007/s11036-005-4453-5.
DOI
|
4 |
A. Hakansson, R. Hartung and N. T. Nguyyen, "Service Oriented Architecture and Agents: Parallels and Opportunities," in Agent and multi-agent technology for internet and enterprise systems, Springer, Berlin, Heidelberg, pp. 25-48, 2010. DOI: https://doi.org/10.1007/978-3-642-13526-2_2
|
5 |
D. J. Persis and T. P. Robert, "Review of ad-hoc on-demand distance vector protocol and its swarm intelligent variants for mobile ad-hoc network," Journal of IET Networks Journal, vol. 6, no. 5, pp. 87-93, September 2017. DOI: 10.1049/iet-net.2017.0015.
|
6 |
S. Buchegger and J.-Y. L. Boudec, "Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks," in Proc. 10th Euromicro Workshop on Parallel, Distributed and Network based Processing, Canary Islands, Spain, pp. 403-410, Jan.9-11, 2002. DOI: 10.1109/EMPDP.2002.994204
|
7 |
A.A. Pirzada, A. Datta, and C. McDonald, "Trust based routing for ad hoc wireless networks," in Proc. 12th IEEE International Conference on Networks (ICON 2004), Singapore, pp. 326-330, Nov.19-19,2004. DOI: 10.1109/ICON.2004.1409063
|
8 |
Y. He, H. Li, X. Cheng, Y. Liu, C. Yang, and L. Sun, "A Blockchain based Truthful Incentive Mechanism for Distributed P2P Applications," Journal of IEEE Access, vol. 6, pp. 27324-27335, April 2018. DOI: 10.1109/ACCESS.2018.2821705.
DOI
|
9 |
J. Guo, I.-R. Chen, and J. J. P. Tsai, "A survey of trust computation models for service management in internet of things systems" Journal of Computer Communications, vol. 97, no. 1, pp. 1-14, October 2017. DOI: 10.1016/j.comcom.2016.10.012.
DOI
|
10 |
S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, https://bitcoin.org/bitcoin.pdf.
|
11 |
D. W. Kravitz and J. Cooper, "Securing User Identity and Transactions Symbiotically: IoT Meets Blockchain," in Proc. 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland, pp. 1-6, Jun.6-9,2017. DOI: 10.1109/GIOTS.2017.8016280
|
12 |
K. C. H. Kim, "The Impact of Blockchain Technology on the Music Industry," International journal of advanced smart convergence, vol. 8, no. 1, pp. 196-203, 2019. DOI: 10.7236/IJASC.2019.8.1.196.
DOI
|
13 |
The Institute of Internet, ns-3 project, ns-3 manual, https://www.nsnam.org/docs/manual/html/index.html.
|
14 |
W. W. Kim, "Improved Paired Cluster-Based Routing Protocol in Vehicular Ad Hoc Networks," International journal of advanced smart convergence, vol. 7, no. 2, pp. 22-32, Jun. 2018. DOI: 10.7236/IJASC.2018.7.2.22.
DOI
|