A Comprehensive Overview on Application of Trust and Reputation in Wireless Sensor Network
暂无分享,去创建一个
[1] Sajal K. Das,et al. A game theory based approach for security in wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[2] Theodore B. Zahariadis,et al. Mobile Networks Trust management in wireless sensor networks , 2010, Eur. Trans. Telecommun..
[3] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[4] Suat Ozdemir,et al. Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .
[5] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[6] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[7] Rodrigo Roman,et al. Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..
[8] Yoonmee Doh,et al. PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[9] Zhou Su,et al. Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.
[10] Juan Manuel González Nieto,et al. RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[11] Félix Gómez Mármol,et al. TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks , 2012, J. Netw. Comput. Appl..
[12] S. Quartz,et al. Getting to Know You: Reputation and Trust in a Two-Person Economic Exchange , 2005, Science.
[13] Bharat K. Bhargava,et al. A role-based access in a hierarchical sensor network architecture to provide multilevel security , 2008, Comput. Commun..
[14] Ling Wei,et al. A Trust Model Based on Bayesian Approach , 2005, AWIC.
[15] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[16] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[17] Fei Hu,et al. Secure Wireless Sensor Networks: Problems and Solutions , 2003 .
[18] Kalpana Sharma,et al. Cross Layer Security Framework for Wireless Sensor Networks , 2011 .
[19] Rodrigo Roman,et al. Featuring trust and reputation management systems for constrained hardware devices , 2007, AUTONOMICS 2007.
[20] Subhash Challa,et al. Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks , 2010, J. Networks.
[21] Arnab Raha,et al. A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP) , 2011, Wirel. Sens. Netw..
[22] K. Komathy,et al. Trust-based evolutionary game model assisting AODV routing against selfishness , 2008, J. Netw. Comput. Appl..
[23] Jianping Pan,et al. Topology control for wireless sensor networks , 2003, MobiCom '03.
[24] Weisong Shi,et al. SensorTrust: A resilient trust model for wireless sensing systems , 2011, Pervasive Mob. Comput..
[25] Mohamed Eltoweissy,et al. μRACER: A Reliable Adaptive Service-Driven Efficient Routing Protocol Suite for Sensor-Actuator Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[26] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[27] Zahra Taghikhaki,et al. Energy-efficient Trust-based aggregation in wireless sensor networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[28] Sushil Jajodia,et al. Secure Data Aggregation in Wireless Sensor Networks , 2008 .
[29] R. Srikant,et al. DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.
[30] Zhu Han,et al. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[31] Félix Gómez Mármol,et al. Providing trust in wireless sensor networks using a bio-inspired technique , 2011, Telecommun. Syst..
[32] Hong Luo,et al. Entropy-Based Trust Management for Data Collection in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[33] Vladimiro Sassone,et al. A Bayesian Model for Event-based Trust , 2022 .
[34] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[35] Daniel Minoli,et al. Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .
[36] Rodrigo Roman,et al. A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).
[37] Jin-Hee Cho,et al. Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[38] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[39] Young-Koo Lee,et al. A trust model for ubiquitous systems based on vectors of trust values , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).
[40] Xue Liu,et al. A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.
[41] Sudip Misra,et al. Reputation-based role assignment for role-based access control in wireless sensor networks , 2011, Comput. Commun..
[42] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[43] Quan Zhou,et al. Secure Routing Protocol Cluster-Gene-Based for Wireless Sensor Networks , 2009, 2009 First International Conference on Information Science and Engineering.
[44] Azzedine Boukerche,et al. A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..
[45] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[46] Juan Manuel González Nieto,et al. Secure Data Aggregation in Wireless Sensor Network: a survey , 2008, AISC.
[47] A. Manjeshwar,et al. TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.
[48] Dai Hongjun,et al. An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks , 2008, ICESS.
[49] Sudip Misra,et al. Ant colony optimization-based congestion control in Ad-hoc wireless sensor networks , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.