References
- Yang M, Li Y, Jin D, et al. Software-defined and virtualized future mobile and wireless networks: a survey. Mob Netw Appl. 2015;20(1):4–18. doi: 10.1007/s11036-014-0533-8
- Öncü S, Ploeg J, van de Wouw N, et al. Cooperative adaptive cruise control: network-aware analysis of string stability. IEEE Trans Intell Transp Syst. 2014;15(4):1527–1537. doi: 10.1109/TITS.2014.2302816
- Zhang XM, Zhang Y, Yan F, et al. Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Trans Mob Comput. 2015;14(4):742–754. doi: 10.1109/TMC.2014.2331966
- Cao TM, Bellata B, Oliver M. Design of a generic management system for wireless sensor networks. Ad Hoc Netw. 2014;20:16–35. doi: 10.1016/j.adhoc.2014.03.002
- Wang Z, Chen Y, Li C. PSR: A lightweight proactive source routing protocol for mobile ad hoc networks. IEEE Trans Veh Technol. 2014;63(2):859–868. doi: 10.1109/TVT.2013.2279111
- Jiang S, Xue Y. Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks. J Netw Comput Appl. 2011;34(2):443–454. doi: 10.1016/j.jnca.2010.03.022
- Andrews JG, Singh S, Ye Q, et al. An overview of load balancing in HetNets: old myths and open problems. IEEE Wirel Commun. 2014;21(2):18–25. doi: 10.1109/MWC.2014.6812287
- Shiu YS, Chang SY, Wu HC, et al. Physical layer security in wireless networks: a tutorial. IEEE Wirel Commun. 2011;18(2):66–74. doi: 10.1109/MWC.2011.5751298
- Akyildiz IF, Wang P, Lin S-C. SoftAir: a software defined networking architecture for 5G wireless systems. Comput Netw. 2015;85:1–18. doi: 10.1016/j.comnet.2015.05.007
- Wang H, Roman HE, Yuan L, et al. Connectivity, coverage and power consumption in large-scale wireless sensor networks. Comput Netw. 2014;75:212–225. doi: 10.1016/j.comnet.2014.10.008
- Shi T, Yang M, Li X, et al. An energy-efficient scheduling scheme for time-constrained tasks in local mobile clouds. Pervasive Mob Comput. 2016;27:90–105. doi: 10.1016/j.pmcj.2015.07.005
- Singh J. An algorithm to reduce the time complexity of earliest deadline first scheduling algorithm in real-time system. arXiv Preprint ArXiv. 2010: 1101.0056.
- Gandomi AH, Alavi, HA. An introduction of krill herd algorithm for engineering optimization. J Civ Eng Manag. 2016;22(3):302–310. doi: 10.3846/13923730.2014.897986
- Wang GG, Gandomi AH, Alavi AH, et al. A hybrid method based on krill herd and quantum-behaved particle swarm optimization. Neural Comput Appl. 2016;27(4):989–1006. doi: 10.1007/s00521-015-1914-z
- Wellons J, Xue Y. The robust joint solution for channel assignment and routing for wireless mesh networks with time partitioning. Ad Hoc Netw. 2014;13:210–221. doi: 10.1016/j.adhoc.2011.05.002
- Dahill B, Levine BN, Royer E, et al. A secure routing protocol for adhoc networks. Proceedings of the 10 Conference on Network Protocols (ICNP), 2002.
- Hu Y-C, Johnson BD, Perrig A. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002). 2002: 3-13.
- Wei Z, Tang FH, Yu R, et al. Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans Veh Technol. 2014;63(9):4647–4658. doi: 10.1109/TVT.2014.2313865
- Wang GG, Gandomi AH, Alavi AH, et al. A hybrid method based on krill herd and quantum-behaved particle swarm optimization. Neural Comput Appl. 2016;27(4):989–1006. doi: 10.1007/s00521-015-1914-z
- Gandomi, Amir H, Amir Alavi H. An introduction of krill herd algorithm for engineering optimization. J Civ Eng Manag. 2016;22(3):302–310. doi: 10.3846/13923730.2014.897986
- Wellons J, Xue Y. The robust joint solution for channel assignment and routing for wireless mesh networks with time partitioning. Ad Hoc Networks. 2014;13:210–221. doi: 10.1016/j.adhoc.2011.05.002
- Boukerch A, Xu L, EL-Khatib K. Trust-based security for wireless ad hoc and sensor networks. Comput Commun. 2007;30(11-12):2413–2427. doi: 10.1016/j.comcom.2007.04.022
- Lin CR, Gerla M. Adaptive clustering for mobile wireless networks. IEEE J Sel Areas Commun. 1997;15(7):1265–1275. doi: 10.1109/49.622910
- Guo J, Zhao N, Richard Yu F, et al. Exploiting adversarial jamming signals for energy harvesting in interference networks. IEEE Trans Wireless Commun. 2017;16(2):1267–1280. doi: 10.1109/TWC.2016.2643658
- Li H, Xu J, Zhang R, et al. A general utility optimization framework for energy-harvesting-based wireless communications. IEEE Commun Mag. 2015;53(4):79–85. doi: 10.1109/MCOM.2015.7081079
- Gandomi AH, Alavi AH. Krill herd: a new bio-inspired optimization algorithm. Commun Nonlinear Sci Numer Simul. 2012;17(12):4831–4845. doi: 10.1016/j.cnsns.2012.05.010