[1] Marttinen A, Wyglinski A M, Jantti R. Statistics-based jamming detection algorithm for jamming attacks against tactical MANETs[C]∥IEEE Military Communications Conference. Baltimore, Maryland, US:IEEE, 2014: 501-506. [2] 金鑫,娄文忠,王辅辅. 基于Ad Hoc无线传感网络的三维智能组网优化算法设计研究[J].兵工学报.2015, 36(5):874-878. JIN Xin, LOU Wen-zhong, WANG Fu-fu. Research on optimization algorithm design of 3D intelligent network based on Ad Hoc wireless sensor networks[J]. Acta Armamentarii, 2015,36(5):874-878. (in Chinese) [3] 姚富强. 通信抗干扰工程与实践[M].北京:电子工业出版社,2012:15-21. YAO Fu-qiang. Communication anti-jamming engineering and practice[M].Beijing: Publishing House of Electronics Industry,2012:15-21. (in Chinese) [4] 李少谦,程郁凡,董彬虹,等. 智能抗干扰通信技术研究[J].无线电通信技术,2012, 38(11):1-4. LI Shao-qian,CHENG Yu-fan,DONG Bin-hong,et al. Research on intelligent anti-jam communication technique[J]. Radio Communications Technology, 2012, 38(11):1-4.(in Chinese) [5] Zhu C, Zheng C L, Shu L, et al. A survey on coverage and connectivity issues in wireless sensor networks[J]. Journal of Network and Computer Applications, 2012, 35(2):619-632. [6] Sethu H, Gerety T. A new distributed topology control algorithm for wireless environments with non-uniform path loss and multipath propagation[J]. Ad Hoc Networks, 2010, 8(3):280-294. [7] Yavuz F, Zhao J, Yagan O, et al. On secure and reliable communications in wireless sensor networks: towards k-connectivity under a random pairwise key predistribution scheme[C]∥2014 IEEE International Symposium on Information Theory. Hawaii, US:IEEE,2014:2381-2385. [8] Miyao K, Nakayama H, Ansari N, et al. LTRT: an efficient and reliable topology control algorithm for ad-hoc networks[J]. IEEE Transactions on Wireless Communications, 2009, 8(12):6050-6058. [9] Gupta P,Kumar P R.Towards an information theory of large networks:an achievable rate region[J].IEEE Transactions on Information Theory,2003,49(8):1877-1894. [10] Li N, Hou J C, Sha L. Design and analysis of an MST-based topology control algorithm[J]. IEEE Transactions on Wireless Communications, 2005, 4(3):1195-1206. [11] Douglas B. West. Introduction to Graph Theory[M].Berkeley:Pearson Education LTD, 2000. [12] 安辉耀,王新安,李挥,等. 移动自组网中的先进路由算法与路由协议[M].北京:科学出版社,2009. AN Hui-yao, WANG Xin-an, LI Hui, et al.Advanced routing algorithm and routing protocol in mobile ad hoc networks[M]. Beijing: Science Press, 2009. (in Chinese) [13] Pei G. Wireless hierarchical routing protocol with group mobility[C]∥ IEEE Wireless Communications and Networking Conference. New Orleans,US:IEEE, 1999. [14] Rajaram S M. An enhanced clustering algorithm for mobile ad hoc networks to improve the throughput[J]. International Journal of Mobile Network Design & Innovation, 2011, 3(3):191-197. [15] Singhal S, Daniel A K. Cluster head selection protocol under node degree, competence level and goodness factor for mobile ad hoc network using AI technique[C]∥International Conference on Advanced Computing and Communication Technologies. Rohtak, India:ICAC,2014,2014:415-420 . [16] Mir Z H, Ko Y B. Adaptive neighbor-based topology control protocol for wireless multi-hop networks[J]. EURASIP Journal on Wireless Communications and Networking, 2012(1):1-17. [17] Newman M E J. The structure and function of complex networks [J]. SIAM Review, 2002,45(2):167-256. [18] 高随祥.图论及网络流理论[M].北京:高等教育出版社,2009. GAO Sui-xiang. Graph theory and network flow theory[M].Beijing: Higher Education Press, 2009. (in Chinese) [19] 谭跃进,吴俊,邓宏钟. 复杂网络抗毁性研究进展[J].上海理工大学学报, 2011,33(6):653-668. TAN Yue-jin, WU Jun, DENG Hong-zhong. Progress in invulnerability of complex networks [J]. University of Shanghai for Science and Technology,2011, 33(6):653-668.(in Chinese) [20] Cohen R, Havlin S. Complex networks: structure, robustness and function[M].New York:Cambridge University Press,2014. |