Security and trust management in opportunistic networks: a survey
暂无分享,去创建一个
Yue Wu | Ping Yi | Yimeng Zhao | Michel Riguidel | Guanghao Wang | P. Yi | Yue Wu | M. Riguidel | Yimeng Zhao | Guanghao Wang
[1] Scott Shenker,et al. A data-oriented (and beyond) network architecture , 2007, SIGCOMM 2007.
[2] Mun Choon Chan,et al. MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network , 2010, 2010 Proceedings IEEE INFOCOM.
[3] Scott C. Burleigh,et al. Bundle Protocol Specification , 2007, RFC.
[4] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[5] Xiaodong Lin,et al. A privacy-preserving proximity friend notification scheme with opportunistic networking , 2012, 2012 IEEE International Conference on Communications (ICC).
[6] Antonio Alfredo Ferreira Loureiro,et al. Protocols, mobility models and tools in opportunistic networks: A survey , 2014, Comput. Commun..
[7] Stephen Farrell,et al. Bundle Security Protocol Specification , 2011, RFC.
[8] Franck Legendre,et al. Social Trust in Opportunistic Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.
[9] A. F. Adams,et al. The Survey , 2021, Dyslexia in Higher Education.
[10] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.
[11] V. Jacobson,et al. Securing Network Content , 2009 .
[12] Yonggang Wen,et al. Towards name-based trust and security for content-centric network , 2011, 2011 19th IEEE International Conference on Network Protocols.
[13] Xuemin Shen,et al. Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System , 2010, 2010 Proceedings IEEE INFOCOM.
[14] Jianfeng Ma,et al. PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud , 2014, KSII Trans. Internet Inf. Syst..
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] G. Pulla,et al. A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .
[17] Milena Radenkovic,et al. Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks , 2014, IEEE Transactions on Vehicular Technology.
[18] Xiaodong Lin,et al. A secure incentive scheme for delay tolerant networks , 2008, 2008 Third International Conference on Communications and Networking in China.
[19] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[20] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[21] Brian Gallagher,et al. MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[22] Refik Molva,et al. Privacy in Content-Based Opportunistic Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.
[23] Cauligi S. Raghavendra,et al. Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.
[24] Liam McNamara,et al. Making the most of your contacts: transfer ordering in data-centric opportunistic networks , 2012, MobiOpp '12.
[25] Christine Julien,et al. MADServer: a server architecture for mobile advanced delivery , 2012, CHANTS '12.
[26] Jean-Yves Le Boudec,et al. Vulnerabilities in Epidemic Forwarding , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[27] V. Cahill,et al. Security considerations in space and delay tolerant networks , 2006, 2nd IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT'06).
[28] Paolo Santi,et al. Social-aware stateless forwarding in pocket switched networks , 2011, 2011 Proceedings IEEE INFOCOM.
[29] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[30] Abbas Jamalipour,et al. Opportunistic node authentication in intermittently connected mobile ad hoc networks , 2010, 2010 16th Asia-Pacific Conference on Communications (APCC).
[31] Khaled A. Harras,et al. Social-Based Trust in Mobile Opportunistic Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[32] S. Belle,et al. Consistent deniable lying : privacy in mobile social networks , 2008 .
[33] Refik Molva,et al. Privacy in context-based and epidemic forwarding , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.
[34] K. Komathy,et al. Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network , 2007, Comput. Commun..
[35] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[36] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[37] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[38] Marco Conti,et al. From ego network to social network models , 2012, MobiOpp '12.
[39] Vikram Srinivasan,et al. Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[40] Aris S. Lalos,et al. Experimental Investigation of Cooperative Schemes on a Real-Time DSP-Based Testbed , 2009, EURASIP J. Wirel. Commun. Netw..
[41] David Lazer,et al. Inferring friendship network structure by using mobile phone data , 2009, Proceedings of the National Academy of Sciences.
[42] Mucheol Kim,et al. Trust and Risk based Access Control and Access Control Constraints , 2011, KSII Trans. Internet Inf. Syst..
[43] Anders Lindgren,et al. Probabilistic routing in intermittently connected networks , 2003, MOCO.
[44] Haitham S. Cruickshank,et al. Managing Access Control in Delay/Disruption Tolerant Networking (DTN) Environment , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[45] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[46] Paolo Santi,et al. Privacy-preserving interest-casting in opportunistic networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[47] Brian L. Mark,et al. Robust cooperative trust establishment for MANETs , 2006, SASN '06.
[48] Jörg Ott,et al. Applicability of identity-based cryptography for disruption-tolerant networking , 2007, MobiOpp '07.
[49] Mads Haahr,et al. Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.
[50] Marco Conti,et al. From opportunistic networks to opportunistic computing , 2010, IEEE Communications Magazine.
[51] Nai-Wei Lo,et al. A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks , 2009, EURASIP J. Wirel. Commun. Netw..
[52] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[53] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[54] Xiaodong Lin,et al. SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks , 2009, IEEE Transactions on Vehicular Technology.
[55] Iain Parris,et al. Privacy-enhanced social-network routing , 2012, Comput. Commun..
[56] Marco Conti,et al. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.
[57] Xiaodong Lin,et al. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.
[58] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[59] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[60] Chunming Qiao,et al. A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks , 2013, IEEE Transactions on Wireless Communications.
[61] Franck Legendre,et al. Trust in Opportunistic Networks , 2009 .
[62] Yin Zhang,et al. Incentive-aware routing in DTNs , 2008, 2008 IEEE International Conference on Network Protocols.
[63] Mike Burmester,et al. Cooperation in Mobile Ad Hoc Networks , 2009, Guide to Wireless Ad Hoc Networks.
[64] Leszek Lilien,et al. The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security , 2007 .
[65] Marcel Waldvogel,et al. Major Domus Redux: Privacy in Mobile Social P2P Networks , 2008 .
[66] David F. Ferraiolo,et al. Assessment of Access Control Systems , 2006 .
[67] K. Psounis,et al. Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case , 2008, IEEE/ACM Transactions on Networking.
[68] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[69] Eitan Altman,et al. Non-cooperative Forwarding in Ad-Hoc Networks , 2005, NETWORKING.
[70] Ioannis Stavrakakis,et al. On the Effects of Cooperation in DTNs , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.
[71] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[72] Xiaodong Lin,et al. Pi: A practical incentive protocol for delay tolerant networks , 2010, IEEE Transactions on Wireless Communications.
[73] Aniket Kate,et al. Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[74] Sajal K. Das,et al. RADON: reputation-assisted data forwarding in opportunistic networks , 2010, MobiOpp '10.
[75] Iain Parris. Privacy-enhanced opportunistic networks , 2010, MobiOpp '10.
[76] Sajal K. Das,et al. A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.
[77] Milena Radenkovic,et al. Adaptive user anonymity for mobile opportunistic networks , 2012, CHANTS '12.
[78] Stephen Farrell,et al. Delay-Tolerant Networking Security Overview , 2009 .