MANET security through a distributed policy-based evaluation of node behaviour
暂无分享,去创建一个
[1] Saadiah Yahya,et al. Analysis of Wormhole attack on MANETs using different MANET routing protocols , 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN).
[2] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[3] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[4] M. Natu,et al. Analysis of wormhole intrusion attacks in MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[5] Vijay Kumar Tripathi,et al. A Survey of Network Layer attacks and Security Mechanisms and Solutions for Routing Protocols in MANET , 2013 .
[6] Victor C. M. Leung,et al. A trust and reputation management system for cloud and sensor networks integration , 2014, 2014 IEEE International Conference on Communications (ICC).
[7] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[8] Simone A. Ludwig,et al. A cognitive trust-based approach for Web service discovery and selection , 2005, Third European Conference on Web Services (ECOWS'05).
[9] D. Collard,et al. Trust : making and breaking cooperative relations , 1989 .
[10] P. Anitha,et al. Detection and Prevention of Wormhole Attacks in Manets Using Path Tracing , 2012 .
[11] Yuguang Fang,et al. A secure incentive protocol for mobile ad hoc networks , 2007, Wirel. Networks.
[12] Magdy S. El-Soudani,et al. An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).
[13] C. Badcock,et al. Trust : making and breaking cooperative relations , 1989 .
[14] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[15] Kwok-Yan Lam,et al. SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.
[16] Stathes Hadjiefthymiades,et al. Trust management in mobile ad hoc networks , 2014, 2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks).
[17] Nabendu Chaki,et al. A comprehensive review on wormhole attacks in MANET , 2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM).
[18] Diego Gambetta. Can We Trust Trust , 2000 .
[19] Licia Capra,et al. Engineering human trust in mobile system collaborations , 2004, SIGSOFT '04/FSE-12.
[20] Rino Falcone,et al. Principles of trust for MAS: cognitive anatomy, social importance, and quantification , 1998, Proceedings International Conference on Multi Agent Systems (Cat. No.98EX160).
[21] Nicholas R. Jennings,et al. An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.