Soft-Computing Based Trust Management Framework for Group Key Management in MANETs
暂无分享,去创建一个
[1] M. Chandrasekaran,et al. Quantifying trust in mobile ad-hoc networks , 2005, International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005..
[2] Pål Spilling,et al. A survey of key management in ad hoc networks , 2006, IEEE Communications Surveys & Tutorials.
[3] Zhiping Jia,et al. A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.
[4] Marcin Seredynski,et al. Nature-Inspired Evaluation of Data Classes for Trust Management in MANETs , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.
[5] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[6] Xiaoqi Li,et al. A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).
[7] Pradeep Reddy Ch,et al. Mitigate Lying and On-Off Attacks on Trust Based Group Key Management Frameworks in MANETs , 2016 .
[8] Kemal Ertugrul Tepe,et al. Game theoretic approach in routing protocol for wireless ad hoc networks , 2009, Ad Hoc Networks.
[9] Hsiao-Hwa Chen,et al. An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.
[10] Hanna Bogucka,et al. Game theory in wireless networks , 2011 .
[11] Guy Pujolle,et al. An autonomic knowledge monitoring scheme for trust management on mobile ad hoc networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[12] Kamal Kumar Chauhan,et al. Securing Mobile Ad hoc Networks:Key Management and Routing , 2012, ArXiv.
[13] Zhiping Jia,et al. Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..
[14] YuHua Yuan,et al. An Optimized Ad-hoc On-demand Multipath Distance Vector(AOMDV) Routing Protocol , 2005, 2005 Asia-Pacific Conference on Communications.
[15] Keshav P. Dahal,et al. Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.
[16] K. Cook. Trust in Society , 2001 .
[17] George C. Hadjichristofi,et al. A framework for key management in mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[18] Timothy W. Finin,et al. Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[19] Gianpiero Costantino,et al. Managing Reputation over MANETs , 2008, 2008 The Fourth International Conference on Information Assurance and Security.
[20] Hamamache Kheddouci,et al. ECGK: An efficient clustering scheme for group key management in MANETs , 2010, Comput. Commun..
[21] Omar Cheikhrouhou,et al. Secure Group communication in Wireless Sensor Networks , 2013 .
[22] Ben-Jye Chang,et al. Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.
[23] Teerawat Issariyakul,et al. Introduction to Network Simulator NS2 , 2008 .
[24] Niki Pissinou,et al. Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy , 2011, 2011 IEEE International Conference on Communications (ICC).
[25] Omar Cheikhrouhou,et al. Secure Group Communication in Wireless Sensor Networks: A survey , 2016, J. Netw. Comput. Appl..
[26] Ruidong Li,et al. On-demand public-key management for mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..
[28] Guy Pujolle,et al. Trust-Distortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[29] I. Awan,et al. Trust Routing in MANET for Securing DSR Routing Protocol , 2010 .
[30] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.