Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using Q-Learning
暂无分享,去创建一个
[1] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[2] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[3] Edwin Hsing-Mean Sha,et al. Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and Markov SCGM(1, 1) model , 2012, Comput. Commun..
[4] J. H. Davis,et al. An integrative model of organizational trust, Academy of Management Review, : . , 1995 .
[5] Zhaoyu Liu,et al. A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..
[6] Ilango Krishnamurthi,et al. Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks , 2014 .