A reputation-based scheme against malicious packet dropping for mobile ad hoc networks
暂无分享,去创建一个
[1] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[2] Xue Liu,et al. A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.
[3] Yacine Rebahi,et al. A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).
[4] Mike Burmester,et al. Cooperation in Mobile Ad Hoc Networks , 2009, Guide to Wireless Ad Hoc Networks.
[5] Jon Crowcroft,et al. Modelling incentives for collaboration in mobile ad hoc networks , 2004, Perform. Evaluation.
[6] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[7] Chris J. Mitchell,et al. Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.
[8] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[9] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[10] Yuan Ning. Securing AD-HOC networks using IPSec , 2006 .
[11] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[12] Stefan Schlott,et al. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.
[13] Jamal N. Al-Karaki,et al. Stimulating Node Cooperation in Mobile Ad hoc Networks , 2008, Wirel. Pers. Commun..
[14] Evangelos Kranakis,et al. Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks , 2003, ADHOC-NOW.
[15] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[16] Zhang Xiaoning and Feng Dengguo. Intrusion Detection for Ad Hoc Routing Based on Fuzzy Behavior Analysis , 2006 .
[17] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..