A Distributed Trust Model for Securing Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[2] Neil Immerman,et al. Leader election algorithms for wireless ad hoc networks , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[3] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[4] Indranil Sengupta,et al. A Trust Based Clustering Framework for Securing Ad Hoc Networks , 2009, ICISTM.
[5] Chris McDonald,et al. A Review of Secure Routing Protocols for Ad hoc Mobile Wireless Networks , 2003 .
[6] Boon-Chong Seet,et al. The Handbook of Ad Hoc Wireless Networks , 2002 .
[7] Sajal K. Das,et al. An on-demand weighted clustering algorithm (WCA) for ad hoc networks , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).
[8] Nitin H. Vaidya,et al. Leader election algorithms for mobile ad hoc networks , 2000, DIALM '00.
[9] Stefano Basagni,et al. Distributed clustering for ad hoc networks , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).
[10] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[11] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[12] Vijay Varadharajan,et al. Security for cluster based ad hoc networks , 2004, Comput. Commun..
[13] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[14] J. Robert Boston. A signal detection system based on Dempster-Shafer theory and comparison to fuzzy detection , 2000, IEEE Trans. Syst. Man Cybern. Part C.
[15] Abderrahim Benslimane,et al. Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).
[16] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[17] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[18] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[19] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[20] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[21] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[22] Hong Liang,et al. Defending against wormhole attack in OLSR , 2006 .
[23] Bharat K. Bhargava,et al. Defending against wormhole attacks in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..
[24] M. Chandrasekaran,et al. Quantifying trust in mobile ad-hoc networks , 2005, International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005..
[25] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[26] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[27] Mohamed A. Deriche,et al. A Dempster-Shafer theory of evidence approach for combining trained neural networks , 2001, ISCAS 2001. The 2001 IEEE International Symposium on Circuits and Systems (Cat. No.01CH37196).