Trust Propagation and Aggregation in Wireless Sensor Networks
暂无分享,去创建一个
Huafeng Wu | Haiguang Chen | Chuanshan Gao | Xiu Cao | Haiguang Chen | Huafeng Wu | Xiu Cao | Chuanshan Gao
[1] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[2] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[3] Huafeng Wu,et al. Reputation-based Trust in Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[4] B SrivastavaMani,et al. Reputation-based framework for high integrity sensor networks , 2008 .
[5] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[6] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[7] Antonio Alfredo Ferreira Loureiro,et al. Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[8] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[9] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[10] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[11] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[12] Shivakant Mishra,et al. A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.
[13] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[14] Huafeng Wu,et al. Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] Haiguang Chen,et al. A new kind of session keys based on message scheme for sensor networks , 2005, 2005 Asia-Pacific Microwave Conference Proceedings.
[17] G. Casella,et al. Statistical Inference , 2003, Encyclopedia of Social Network Analysis and Mining.
[18] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[19] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[20] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[21] Huafeng Wu,et al. Agent-based Trust Model in Wireless Sensor Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[22] Jean-Yves Le Boudec,et al. Analysis of a robust reputation system for self-organised networks , 2005, Eur. Trans. Telecommun..
[23] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.