[1]CROWCROFT J, YONEKI E, HUI P, et al. Promoting tolerance for delay tolerant network research[J]. SIGCOMM Computer Communication Review, 2008, 38(5):63-68.[2]LINDGREN A, HUI P. The quest for a killer app for opportunistic and delay tolerant networks[C] // Proceedings of the 4th ACM Workshop on Challenged Networks. New York:ACM,2009: 59-66.[3]TOURNOUX P, LOCHIN E, LEGUAY J, et al. Robust streaming in delay tolerant networks[C]// Proceedings of the International Communications Conference.Piscataway:IEEE, 2010:1-5. [4]SPYROPOULOS T, PSOUNIS K, RAGHAVENDRA C S. Efficient routing in intermittently connected mobile networks: the multiple-copy cast[J]. IEEE/ACM Transactions on Networking,2008,16(1):77-90. [5]PANAGAKIS A, VAIOS A, STAVRAKAKIS I. On the effects of cooperation in DTNs[C]// Proceedings of the 2nd International Conference on Communication System Software and Middleware and Workshops COMSWARE. Piscataway:IEEE, 2007:1-6. [6]KARALIOPOULOS M. Assessing the vulnerability of DTN data relaying schemes to node selfishness[J]. IEEE Communications Letters,2009,13(12):923-925.[7]LI Y, SU G, WU D, et al. The impact of node selfishness on multicasting in delay tolerant networks[J]. IEEE Transactions on Vehicular Technology,2011,60(5):2224-2238.[8]HE Q, WU D, KHOSLA P. SORI: A secure and objective reputation-based incentive scheme for Ad Hoc networks[C] // Proceedings of Wireless Communications and Networking Conference 2004. Piscataway:IEEE, 2004:825-830.[9]ZHU H, LIN X, LU R, et al. SMART:A secure multilayer credit-based incentive scheme for delay-tolerant networks[J]. IEEE Transactions on Vehicular Technology,2009,58(8):828-836.[10]LEE S B, PAN G, PARK J S, et al. Secure incentives for commercial ad dissemination in vehicular networks[C] // Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing. New York:ACM, 2007:150-159.[11]The ONE 1.4.1[EB/OL].[2012-06-20]. http://www.net-lab.kk.fi/tutkimus/dtn/theone/Tietover-kko laboratorio.[12]KERANEN A, OTT J, KARKKAINEN T. The ONE simulator for DTN protocol evaluation[C]// Proceedings of the 2nd International Conference on Simulation Tools and Techniques. New York:ACM,2009:5674. |