Reputation-based framework for high integrity sensor networks
暂无分享,去创建一个
[1] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[2] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[3] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[4] Yunghsiang Sam Han,et al. A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[5] M. Potkonjak,et al. Error models for light sensors by statistical analysis of raw sensor measurements , 2004, Proceedings of IEEE Sensors, 2004..
[6] Haiyun Luo,et al. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.
[7] Joan Feigenbaum,et al. The KeyNote Trust-Management System , 1998 .
[8] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[9] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[10] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[11] John Anderson,et al. An analysis of a large scale habitat monitoring application , 2004, SenSys '04.
[12] Chrysanthos Dellarocas,et al. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.
[13] Ling Liu,et al. A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.
[14] R. Trivers. The Evolution of Reciprocal Altruism , 1971, The Quarterly Review of Biology.
[15] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[16] Chrysanthos Dellarocas,et al. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems , 2000, ICIS.
[17] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[18] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[19] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[20] Jens Palsberg,et al. Avrora: scalable sensor network simulation with precise timing , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[21] Paul Resnick,et al. Reputation systems , 2000, CACM.
[22] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[23] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[24] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[25] Mani B. Srivastava,et al. A dynamic operating system for sensor nodes , 2005, MobiSys '05.
[26] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[27] Raymond T. Ng,et al. Finding Intensional Knowledge of Distance-Based Outliers , 1999, VLDB.
[28] Miodrag Potkonjak,et al. Model-based calibration for sensor networks , 2003, Proceedings of IEEE Sensors 2003 (IEEE Cat. No.03CH37498).
[29] Christos Faloutsos,et al. LOCI: fast outlier detection using the local correlation integral , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[30] David B. Dunson,et al. Bayesian Data Analysis , 2010 .
[31] T. Ferguson. A Bayesian Analysis of Some Nonparametric Problems , 1973 .
[32] Paul Resnick,et al. Reputation Systems: Facilitating Trust in Internet Interactions , 2000 .
[33] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[34] M. Potkonjak,et al. On-line fault detection of sensor measurements , 2003, Proceedings of IEEE Sensors 2003 (IEEE Cat. No.03CH37498).
[35] Jean-Yves Le Boudec,et al. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[36] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[37] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[38] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[39] Shivakant Mishra,et al. A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.
[40] S. Buchegger,et al. Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[41] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[42] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[43] Vic Barnett,et al. Outliers in Statistical Data , 1980 .
[44] Pietro Michiardi,et al. A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks , 2003 .
[45] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[46] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[47] M. Potkonjak,et al. Markov chain-based models for missing and faulty data in MICA2 sensor motes , 2005, IEEE Sensors, 2005..
[48] David E. Culler,et al. Versatile low power media access for wireless sensor networks , 2004, SenSys '04.
[49] Raymond T. Ng,et al. Algorithms for Mining Distance-Based Outliers in Large Datasets , 1998, VLDB.
[50] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[51] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[52] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD 2000.
[53] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[54] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.