[1] VENKANNA U, VELUSAMY R L. Black hole attack and their counter measure based on trust management in MANET:a survey[C]//Proceedings of the 20113rd International Conference on Advances in Recent Technologies in Communication and Computing. Stevenage, UK:IET, 2011:232-236. [2] 朱清超,陈靖,龚水清,等.移动自组网媒体接入控制协议吞吐量与公平性均衡设计[J].计算机应用,2015,35(11):3275-3279.(ZHU Q C, CHEN J, GONG S Q, et al. Design of medium access control protocol tradeoff between throughput and fairness in MANET[J]. Journal of Computer Applications, 2015, 35(11):3275-3279.) [3] KATIYAR S, GUJRAL R, MALLICK B. Comparative performance analysis of MANET routing protocols in military operation using NS2[C]//Proceedings of the 2015 International Conference on Green Computing and Internet of Things. Washington, DC:IEEE Computer Society, 2015:603-609. [4] 李世宝,娄琳琳,陈瑞祥,等.基于方向预测的移动自组网概率转发算法[J].计算机应用,2013,33(8):2117-2120.(LI S B, LOU L L, CHEN R X, et al. Probabilistic forwarding algorithm of mobile Ad Hoc networks based on directional prediction[J]. Journal of Computer Applications, 2013, 33(8):2117-2120.) [5] GUAN Q, YU F R, JIANG S. Prediction-based topology control and routing in cognitive radio mobile Ad Hoc networks[J]. IEEE Transactions on Vehicular Technology, 2010, 59(9):4443-4452. [6] YOUNIS O, KANT L, CHANG K, et al. Cognitive MANET design for mission-critical networks[J]. IEEE Communications Magazine, 2009, 47(10):64-71. [7] EASTLAKE D 3rd, ABLEY J. IANA considerations and IETF protocol and documentation usage for IEEE 802 parameters[EB/OL].[2013-10-01]. http://www.rfc-editor.org/rfc/rfc7042.txt. [8] EASTLAKE D 3RD. IANA considerations and IETF protocol usage for IEEE 802 parameters[EB/OL].[2008-09-01]. http://www.rfc-editor.org/rfc/rfc5342.txt. [9] BIANCHI G. Performance analysis of the IEEE 802.11 distributed coordination function[J]. IEEE Journal on Selected Areas in Communications, 2006, 18(3):535-547. [10] DANESHGARAN F, LADDOMADA M, MESITI F, et al. Unsaturated throughput analysis of IEEE 802.11 in presence of non ideal transmission channel and capture effects[J]. IEEE Transactions on Wireless Communications, 2008, 7(4):1276-1286. [11] LEONARDO E J, YACOUB M D. Exact formulations for the throughput of IEEE 802.11 DCF in Hoyt, Rice, and Nakagami-m fading channels[J]. IEEE Transactions on Wireless Communications, 2013, 12(5):2261-2271. [12] BAROUDI U, AL-ROUBAIEY A, MEKID S, et al. The impact of sensor node distribution on routing protocols performance:a comparitive study[C]//Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Piscataway, NJ:IEEE, 2012:25-27. [13] LIU Y T, XU J, XIA G Y. Node distribution of the random direction model in a square region[C]//Proceedings of the 2014 International Conference on Mechatronics and Control. Piscataway, NJ:IEEE, 2014:21-25. [14] SIBEKO N, MUDALI P, OKI O, et al. Performance evaluation of routing protocols in uniform and normal node distributions using inter-mesh wireless networks[C]//Proceedings of the 2015 World Symposium on Computer Networks and Information Security. Piscataway, NJ:IEEE, 2015:1-6. [15] MARIMON M C, TANGONAN G, LIBATIQUE N J, et al. Development and evaluation of wave sensor nodes for ocean wave monitoring[J]. IEEE Systems Journal, 2015, 9(1):292-302. [16] TSENG C C, CHEN H T, CHEN K C. On the distance distributions of the wireless Ad Hoc network[C]//Proceedings of the IEEE 63rd Vehicular Technology Conference. Piscataway, NJ:IEEE, 2006:772-776. [17] HAENGGI M. On distances in uniformly random networks[J]. IEEE Transactions on Information Theory, 2005, 51(10):3584-3586. [18] KENDALL M G, MORAN P A P. Geometric Probability[M]. New York:Hafner, 1963:50-75. [19] NAKAGAMI M. The m-distribution-a general formula of intensity distribution of rapid fading[EB/OL].[2016-12-13]. https://www.researchgate.net/publication/239060991_The_m-Distribution-A_General_Formula_of_Intensity_Distribution_of_Rapid_Fading?ev=auth_pub. [20] GONG Z, HAENGGI M. The local delay in mobile Poisson networks[J]. IEEE Transactions on Wireless Communications, 2013, 12(9):4766-4777. [21] SCHILCHER U, TOUMPIS S, HAENGGI M, et al. Interference functionals in Poisson networks[J]. IEEE Transactions on Information Theory, 2015, 62(1):370-383. [22] BANCHS A, ORTIN J, GARCIA-SAAVEDRA A, et al. Thwarting selfish behavior in 802.11 WLANs[J]. IEEE/ACM Transactions on Networking, 2016, 24(1):492-505. [23] LI M, SALINAS S, LI P, et al. MAC-Layer selfish misbehavior in IEEE802.11 Ad Hoc networks:detection and defense[J]. IEEE Transactions on Mobile Computing, 2015, 14(6):1203-1217. [24] JEON W S, HAN J A, DONG G J. A novel MAC scheme for multichannel cognitive radio Ad Hoc networks[J]. IEEE Transactions on Mobile Computing, 2012, 11(6):922-934. [25] DEBROY S, DE S, CHATTERJEE M. Contention based multichannel MAC protocol for distributed cognitive radio networks[J]. IEEE Transactions on Mobile Computing, 2014, 13(12):2749-2762. [26] ZHANG X, WU L, ZHANG Y, et al. Interference dynamics in MANETs with a random direction node mobility model[C]//Proceedings of the 2013 IEEE Wireless Communications and Networking Conference. Piscataway, NJ:IEEE, 2013:3788-3793. [27] CHUNG J, CLAYPOOL M. NS by example[EB/OL].[2015-06-10]. http://nile.wpi.edu/NS/. [28] SANUM W, KETTHONG P, NOYMANEE J. A deterministic node mobility model for mobile Ad Hoc wireless network using Signum-based discrete-time chaotic map[C]//Proceedings of the 2015 International Telecommunication Networks and Applications Conference. Piscataway, NJ:IEEE, 2015:114-119. [29] AHSEN M, HASSAN S A. A Poisson point process model for coverage analysis of multi-hop cooperative networks[C]//Proceedings of the 2015 International Wireless Communications and Mobile Computing Conference. Piscataway, NJ:IEEE, 2015:442-447. [30] CHUI C K, CHEN G. Kalman filtering with real-time applications[M]//Springer Series in Information Sciences. Berlin:Springer, 2009:50-56. |