Reputation-based role assignment for role-based access control in wireless sensor networks
暂无分享,去创建一个
[1] Niki Pissinou,et al. Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[2] Sudip Misra,et al. Ant colony optimization-based congestion control in Ad-hoc wireless sensor networks , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.
[3] Vivek Tiwari,et al. Lacas: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks , 2009, IEEE Journal on Selected Areas in Communications.
[4] Mohammad S. Obaidat,et al. An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks , 2009, Secur. Commun. Networks.
[5] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[6] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[7] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[8] Panagiotis Papadimitratos,et al. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.
[9] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[10] Valérie Issarny,et al. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.
[11] Sudip Misra,et al. E2-SCAN: an extended credit strategy-based energy-efficient security scheme for wireless ad hoc networks , 2009, IET Commun..
[12] Xu Li,et al. An agent-based trust and reputation management scheme for wireless sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[13] Mohammad S. Obaidat,et al. A Fuzzy logic-based Energy Efficient Packet Loss Preventive Routing Protocol , 2009, 2009 International Symposium on Performance Evaluation of Computer & Telecommunication Systems.
[14] Bharat K. Bhargava,et al. A role-based access in a hierarchical sensor network architecture to provide multilevel security , 2008, Comput. Commun..
[15] Yuguang Fang,et al. Access control in wireless sensor networks , 2007, Ad Hoc Networks.
[16] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[17] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[18] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[19] Jean-Yves Le Boudec,et al. Analysis of a reputation system for Mobile Ad-Hoc Networks with liars , 2008, Perform. Evaluation.
[20] Boi Faltings,et al. An incentive compatible reputation mechanism , 2003, AAMAS '03.
[21] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[22] Sudip Misra,et al. REEP: data-centric, energy-efficient and reliable routing protocol for wireless sensor networks , 2008, IET Commun..
[23] Sudip Misra,et al. Dividing PKI in strongest availability zones , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.
[24] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[25] Mohammad S. Obaidat,et al. FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks , 2008, Comput. Commun..
[26] P. Venkata Krishna,et al. LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.
[27] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[28] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[29] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[30] Romano Fantacci,et al. Lightweight, Distributed Access Control for Wireless Sensor Networks Supporting Mobility , 2008, 2008 IEEE International Conference on Communications.
[31] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[32] Ma Jian-feng,et al. An Access Control Scheme in Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[33] Mohammad S. Obaidat,et al. Chinese Remainder Theorem-Based RSA-Threshold Cryptography in MANET Using Verifiable Secret Sharing Scheme , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[34] Sudip Misra,et al. Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks , 2011, Wirel. Commun. Mob. Comput..
[35] Sudip Misra,et al. Geographic server distribution model for key revocation , 2010, Telecommun. Syst..
[36] Sudip Misra,et al. Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks , 2010, Comput. Electr. Eng..
[37] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[38] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[39] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[40] Mohammad S. Obaidat,et al. A Secure and Energy-Efficient Scheme for Group-Based Routing in Heterogeneous Ad Hoc Sensor Networks and Its Simulation Analysis , 2008, Simul..
[41] Ravi S. Sandhu. A Perspective on Graphs and Access Control Models , 2004, ICGT.
[42] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[43] Mohammad S. Obaidat,et al. Attack Graph Generation with Infused Fuzzy Clustering , 2009, SECRYPT.
[44] Myong-Soon Park,et al. SCAF: A Secure Cluster-Based Architecture Formation Scheme for Wireless Sensor Network , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.