Trust management system in wireless sensor networks: design considerations and research challenges
暂无分享,去创建一个
Aamir Saeed Malik | Sung Won Kim | Farruh Ishmanov | Bahodir Begalov | A. Malik | S. Kim | Farruh Ishmanov | B. Begalov
[1] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[2] Hyunsoo Yoon,et al. Trust-based secure aggregation in wireless sensor networks , 2005 .
[3] Narayan C. Debnath,et al. Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.
[4] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[5] Nael B. Abu-Ghazaleh,et al. Location verification and trust management for resilient geographic routing , 2007, J. Parallel Distributed Comput..
[6] Raouf Boutaba,et al. Robust and scalable trust management for collaborative intrusion detection , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.
[7] Elfed Lewis,et al. A comparative review of wireless sensor network mote technologies , 2009, 2009 IEEE Sensors.
[8] Yan Sun,et al. Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[9] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[10] Cristina Alcaraz,et al. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.
[11] S. Shankar Sastry,et al. Time synchronization attacks in sensor networks , 2005, SASN '05.
[12] Jayashree D. Mallapur,et al. Trust Based Secured Routing in Wireless Multimedia Sensor Networks , 2012, 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks.
[13] Ahmed Helmy,et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[14] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.
[15] Jean-Marc Seigneur,et al. Collaborative Computer Security and Trust Management , 2009 .
[16] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[17] Subhash Challa,et al. GTRSSN: Gaussian Trust and Reputation System for Sensor Networks , 2008, SCSS.
[18] Sanjay Kumar Madria,et al. A Secure Data Aggregation Based Trust Management Approach for Dealing with Untrustworthy Motes in Sensor Network , 2011, 2011 International Conference on Parallel Processing.
[19] Suat Ozdemir,et al. Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .
[20] Liang Ding,et al. Trust Evaluation Sensing for Wireless Sensor Networks , 2011, IEEE Transactions on Instrumentation and Measurement.
[21] Xiang Zhou,et al. A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.
[22] İnan Güler,et al. A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks , 2011 .
[23] Young-Koo Lee,et al. An Extended Energy Consumption Analysis of Reputation-based Trust Management Schemes of Wireless Sensor Networks , 2010, J. Networks.
[24] Zheng Yan,et al. Autonomic Trust Management for a Component-Based Software System , 2011, IEEE Transactions on Dependable and Secure Computing.
[25] Ruidong Li,et al. Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.
[26] Peng Ning,et al. Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.
[27] Stefanos Gritzalis,et al. Trust Establishment in Ad Hoc and Sensor Networks , 2006, CRITIS.
[28] Zhu Han,et al. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[29] Félix Gómez Mármol,et al. Providing trust in wireless sensor networks using a bio-inspired technique , 2011, Telecommun. Syst..
[30] L. S. Ng,et al. Expert security system in wireless sensor networks based on fuzzy discussion multi-agent systems , 2010 .
[31] Raouf Boutaba,et al. Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks , 2011, IEEE Transactions on Network and Service Management.
[32] Hongjun Dai,et al. Trust Evaluation and Dynamic Routing Decision Based on Fuzzy Theory for MANETs , 2009, J. Softw..
[33] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[34] Sneha Kumar Kasera,et al. Statistical trust establishment in wireless sensor networks , 2007, 2007 International Conference on Parallel and Distributed Systems.
[35] Chunyan Miao,et al. A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.
[36] R. Subramanian. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions , 2008 .
[37] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[38] Weisong Shi,et al. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.
[39] Yoonmee Doh,et al. PLUS: parameterised localised trust management-based security framework for sensor networks , 2008, Int. J. Sens. Networks.
[40] Shukor Abd Razak,et al. Trust-Based Routing Mechanism in MANET: Design and Implementation , 2013, Mob. Networks Appl..
[41] Sudip Misra,et al. Reputation-based role assignment for role-based access control in wireless sensor networks , 2011, Comput. Commun..
[42] Baoxian Zhang,et al. Recent Advances in Wireless Communications and Networking , 2011, Mob. Networks Appl..
[43] Uthman A. Baroudi,et al. Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks , 2009, IET Commun..
[44] Hyunsoo Yoon,et al. Trust Management for Resilient Wireless Sensor Networks , 2005, ICISC.
[45] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[46] Félix Gómez Mármol,et al. Linguistic Fuzzy Logic Enhancement of a Trust Mechanism for Distributed Networks , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[47] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[48] Jianhua Ma,et al. Power-Aware and Reliable Sensor Selection Based on Trust for Wireless Sensor Networks , 2010, J. Commun..
[49] Jin-Hee Cho,et al. Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[50] Stefanos Gritzalis,et al. Trust-Based Data Disclosure in Sensor Networks , 2009, 2009 IEEE International Conference on Communications.
[51] Félix Gómez Mármol,et al. Security threats scenarios in trust and reputation models for distributed systems , 2009, Comput. Secur..
[52] Prasant Mohapatra,et al. Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.
[53] Xuefeng Zheng,et al. A Secure Routing Scheme for Static Wireless Sensor Networks , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[54] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[55] Aamir Saeed Malik,et al. Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): a comprehensive overview , 2011, Eur. Trans. Telecommun..
[56] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[57] Ibrahima Niang,et al. A Survey of Access Control Schemes in Wireless Sensor Networks , 2011 .
[58] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[59] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[60] Tae Kyung Kim,et al. A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .
[61] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[62] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[63] Yang Zhang,et al. Trust Based Secure Localization in Wireless Sensor Networks , 2011, 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing.
[64] Raouf Boutaba,et al. Design of a Simulation Framework to Evaluate Trust Models for Collaborative Intrusion Detection , 2009, 2009 International Conference on Network and Service Security.
[65] Azzedine Boukerche,et al. Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Computer Communications 30 (2007) 2413-2427] , 2007, Comput. Commun..
[66] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[67] Anna Felkner. How the Role-Based Trust Management Can Be Applied to Wireless Sensor Networks , 2012 .
[68] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[69] Gang Qu,et al. Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.