UNION: A Trust Model Distinguishing Intentional and Unintentional Misbehavior in Inter-UAV Communication
暂无分享,去创建一个
Juan-Carlos Cano | Carlos T. Calafate | Abderrahmane Lakas | Nasreddine Lagraa | Ezedin Barka | Chaker Abdelaziz Kerrache
[1] J. Cano,et al. A performance comparison of energy consumption for Mobile Ad Hoc Network routing protocols , 2000, Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728).
[2] Aida Ben Chehida Douss,et al. A Trust Management Based Security Mechanism against Collusion Attacks in a MANET Environment , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.
[3] Mohsen Guizani,et al. Drone-Assisted Public Safety Networks: The Security Aspect , 2017, IEEE Communications Magazine.
[4] Rajesh Kumar,et al. An opportunistic cross layer design for efficient service dissemination over flying ad hoc networks (FANETs) , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).
[5] Claudio E. Palazzi,et al. FANET Application Scenarios and Mobility Models , 2017, DroNet@MobiSys.
[6] Laura Marie Feeney,et al. An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks , 2001, Mob. Networks Appl..
[7] Hakim Ghazzai,et al. Energy-Efficient Management of Unmanned Aerial Vehicles for Underlay Cognitive Radio Systems , 2017, IEEE Transactions on Green Communications and Networking.
[8] W. Marsden. I and J , 2012 .
[9] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[10] Hai Wang,et al. DFRA: Demodulation-free random access for UAV ad hoc networks , 2017, 2017 IEEE International Conference on Communications (ICC).
[11] Nader Mohamed,et al. Towards Trusted and Efficient UAV-Based Communication , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).
[12] Abderrahmane Lakas,et al. Reputation-aware energy-efficient solution for FANET monitoring , 2017, 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC).
[13] Neeraj Kumar,et al. Security and Trust Management in MANET , 2011 .
[14] Floriano De Rango,et al. Link-Stability and Energy Aware Routing Protocol in Distributed Wireless Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[15] Jorma T. Virtamo,et al. Spatial node distribution of the random waypoint mobility model with applications , 2006, IEEE Transactions on Mobile Computing.
[16] Juan-Carlos Cano,et al. Trust Management for Vehicular Networks: An Adversary-Oriented Overview , 2016, IEEE Access.
[17] S Bhattacharya,et al. Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.
[18] Ananthram Swami,et al. CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks , 2018, IEEE Transactions on Services Computing.
[19] Hyunbum Kim,et al. On differential privacy-preserving movements of unmanned aerial vehicles , 2017, 2017 IEEE International Conference on Communications (ICC).
[20] Rajesh Kumar,et al. Cooperative frameworks and network models for flying ad hoc networks: a survey , 2017, Concurr. Comput. Pract. Exp..
[21] Weiqing Sun,et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[22] Konstantinos G. Nikolakopoulos,et al. Commercial vs professional UAVs for mapping , 2017 .
[23] Seung-Woo Seo,et al. Cooperative Unmanned Autonomous Vehicle Control for Spatially Secure Group Communications , 2012, IEEE Journal on Selected Areas in Communications.
[24] Mani Srivastava,et al. Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..
[25] Wenshan Wang,et al. A data authentication scheme for UAV ad hoc network communication , 2017, The Journal of Supercomputing.
[26] Naveen K. Chilamkurti,et al. Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..
[27] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[28] Nicolas Larrieu,et al. Extended verification of secure UAANET routing protocol , 2016, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC).