ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks
暂无分享,去创建一个
Mianxiong Dong | Kaoru Ota | Yuxin Liu | Anfeng Liu | M. Dong | K. Ota | Anfeng Liu | Yuxin Liu
[1] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[2] Sung-Ju Lee,et al. Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[3] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[4] Satish K. Tripathi,et al. A framework for reliable routing in mobile ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[5] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[6] Wenjing Lou,et al. H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks , 2006, IEEE Transactions on Vehicular Technology.
[7] Hung-Min Sun,et al. An efficient countermeasure to the selective forwarding attack in wireless sensor networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.
[8] Meng-Yen Hsieh,et al. Adaptive security design with malicious node detection in cluster-based sensor networks , 2007, Comput. Commun..
[9] Lionel M. Ni,et al. A Reliability-oriented Transmission Service in Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[10] J.-P. Hubaux,et al. Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.
[11] Mounir Frikha,et al. Load-balancing in MANET shortest-path routing protocols , 2009, Ad Hoc Networks.
[12] Tae Ho Cho,et al. A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks , 2010, Comput. Commun..
[13] Jiming Chen,et al. Energy provisioning in wireless rechargeable sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.
[14] Yanheng Liu,et al. Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..
[15] Weisong Shi,et al. SensorTrust: A resilient trust model for wireless sensing systems , 2011, Pervasive Mob. Comput..
[16] Athanasios V. Vasilakos,et al. ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[17] Weisong Shi,et al. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.
[18] Theodore B. Zahariadis,et al. Combining trust with location information for routing in wireless sensor networks , 2012, Wirel. Commun. Mob. Comput..
[19] Félix Gómez Mármol,et al. TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks , 2012, J. Netw. Comput. Appl..
[20] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[21] Xin Jin,et al. Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network , 2013, Inf. Sci..
[22] Jiming Chen,et al. Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).
[23] Satria Mandala,et al. Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks , 2014, SSCC.
[24] Athanasios V. Vasilakos,et al. Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.
[25] Jiming Chen,et al. Mobility and Intruder Prior Information Improving the Barrier Coverage of Sparse Sensor Networks , 2014, IEEE Transactions on Mobile Computing.
[26] Peng Zhou,et al. Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs , 2015, IEEE Transactions on Information Forensics and Security.
[27] Elisa Bertino,et al. Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.
[28] Mianxiong Dong,et al. An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing , 2015, J. Parallel Distributed Comput..
[29] Victor C. M. Leung,et al. An Authenticated Trust and Reputation Calculation , 2017 .
[30] Anfeng Liu,et al. An Efficient Heuristic Subtraction Deployment Strategy to Guarantee Quality of Event Detection for WSNs , 2015, Comput. J..
[31] Mianxiong Dong,et al. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs , 2015, Sensors.
[32] Minyi Guo,et al. Mobile Target Detection in Wireless Sensor Networks With Adjustable Sensing Frequency , 2016, IEEE Systems Journal.
[33] Zhongming Zheng,et al. Energy and Memory Efficient Clone Detection in Wireless Sensor Networks , 2016, IEEE Transactions on Mobile Computing.
[34] T. L. Priyadarsini,et al. Secure Data Collection in Wireless Sensor Networks using Randomized Dispersive Routes , 2016 .
[35] Minyi Guo,et al. Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.
[36] Mianxiong Dong,et al. Service Pricing Decision in Cyber-Physical Systems: Insights from Game Theory , 2016, IEEE Transactions on Services Computing.