Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
暂无分享,去创建一个
[1] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[2] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[3] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[4] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[5] N. Pissinou,et al. Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[6] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[7] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[8] TAODV : A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks , 2004 .
[9] Mohit Jain,et al. Notice of Violation of IEEE Publication Principles A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks , 2009 .
[10] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[11] Ioannis Papaefstathiou,et al. DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS , 2010 .
[12] Sajal K. Das,et al. Modeling node compromise spread in wireless sensor networks using epidemic theory , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[13] Wang Sheng,et al. Mobile agent based moving target methods in wireless sensor networks , 2005, IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005..
[14] Shiuh-Pyng Shieh,et al. An efficient broadcast authentication scheme in wireless sensor networks , 2006, ASIACCS '06.
[15] Makoto Takizawa,et al. A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.
[16] Xiaoyan Hong,et al. A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.
[17] Hassan Artail,et al. A cluster-based trust-aware routing protocol for mobile ad hoc networks , 2010, Wirel. Networks.
[18] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[19] Zheng Yan,et al. Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .
[20] David E. Culler,et al. Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.
[21] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.
[22] Leonidas J. Guibas,et al. Wireless sensor networks - an information processing approach , 2004, The Morgan Kaufmann series in networking.
[23] Qiang Wang,et al. A mobile-agent-based middleware for wireless sensor networks data fusion , 2009, 2009 IEEE Instrumentation and Measurement Technology Conference.
[24] Ming Gu,et al. Trust Based Routing for Misbehavior Detection in Ad Hoc Networks , 2010, J. Networks.
[25] Weisong Shi,et al. TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks , 2010, EWSN.
[26] Philip Levis,et al. Collection tree protocol , 2009, SenSys '09.
[27] Tassos Dimitriou,et al. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[28] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[29] Zhong Chen,et al. FBSR: feedback-based secure routing protocol for wireless sensor networks , 2008, Int. J. Pervasive Comput. Commun..
[30] Mohamed Eltoweissy,et al. TARP: A Trust-Aware Routing Protocol for Sensor-Actuator Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[31] Li Bai,et al. Performance analysis of mobile agent-based wireless sensor network , 2009, 2009 8th International Conference on Reliability, Maintainability and Safety.
[32] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[33] Panagiotis Karkazis,et al. DESIGN AND IMPLEMENTATION OF A TRUST -AWARE ROUTING PROTOCOL FOR LARGE WSN S , 2010 .
[34] Shin Dong-Ryeol,et al. A Mobile Agent Based LEACH in Wireless Sensor Networks , 2008, 2008 10th International Conference on Advanced Communication Technology.
[35] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[36] Weisong Shi,et al. SensorTrust: a resilient trust model for WSNs , 2009, SenSys '09.
[37] Xiaoyan Hong,et al. Recent advances in mobility modeling for mobile ad hoc network research , 2004, ACM-SE 42.