A Novel Approach Towards Enhancing the Performance of Trust Based RPL Protocol in Internet of Things
暂无分享,去创建一个
[1] Jiguo Li,et al. Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage , 2017, Int. J. Commun. Syst..
[2] Dong Yang,et al. TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[3] Manoj Misra,et al. Trust Based Multi Path DSR Protocol , 2010, 2010 International Conference on Availability, Reliability and Security.
[4] Gutierrez Jairo,et al. Securing RPL routing protocol from blackhole attacks using a trust-based mechanism , 2016 .
[5] Christian Müller-Schloer,et al. Comparing the Effects of Disturbances in Self-adaptive Systems - A Generalised Approach for the Quantification of Robustness , 2018, Trans. Comput. Collect. Intell..
[6] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[7] Jia Guo,et al. Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[8] Deepika Kukreja,et al. Analytical models for trust based routing protocols in wireless ad hoc networks , 2012, SOEN.
[9] Djamel Tandjaoui,et al. Trust-based RPL for the Internet of Things , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[10] Rana Ejaz Ahmed. A Fault-Tolerant Routing Protocol for Mobile Ad Hoc Networks , 2011 .
[11] Jin-Hee Cho,et al. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[12] N. Nalini,et al. Performance analysis of routing protocols for IoT , 2018 .
[13] Jia Guo,et al. Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).
[14] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[15] Deepika Kukreja,et al. Trust based Routing using Dominating Set Approach (TRDSA) in Wireless Ad-Hoc Networks , 2012 .
[16] Jin-Hee Cho,et al. On the tradeoff between altruism and selfishness in MANET trust management , 2013, Ad Hoc Networks.
[17] Sayan Kumar Ray,et al. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..
[18] Sayan Kumar Ray,et al. Securing RPL routing protocol from blackhole attacks using a trust-based mechanism , 2016, 2016 26th International Telecommunication Networks and Applications Conference (ITNAC).
[19] Akanksha Jain,et al. A Survey on Miscellaneous Attacks and Countermeasures for RPL Routing Protocol in IoT , 2019 .
[20] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[21] Jia Guo,et al. Hierarchical trust management of community of interest groups in mobile ad hoc networks , 2015, Ad Hoc Networks.
[22] Hongke Zhang,et al. TC-BAC: A trust and centrality degree based access control model in wireless sensor networks , 2013, Ad Hoc Networks.
[23] Jin-Hee Cho,et al. On modeling of adversary behavior and defense for survivability of military MANET applications , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[24] Jin-Hee Cho,et al. Composite trust-based public key management in mobile ad hoc networks , 2013, SAC '13.
[25] Ing-Ray Chen,et al. Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks , 2015, IEEE Transactions on Network and Service Management.
[26] Ananthram Swami,et al. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks , 2009 .
[27] Huang Chuanhe,et al. Trusted Dynamic Source Routing Protocol , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.