Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory
暂无分享,去创建一个
Zhiping Jia | Lei Ju | Hui Xia | Youqin Zhu | Zhiping Jia | Hui Xia | Lei Ju | Youqin Zhu
[1] Zhang Xue-feng,et al. Method of ameliorative multi-objective synthetic evaluation based on entropy weight and its application , 2009, 2009 Chinese Control and Decision Conference.
[2] Luo Junhai and Fan Mingyu. A Subjective Trust Management Model Based on Certainty-Factor for MANETs , 2010 .
[3] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[4] Ghobad Heidari. Medium Access Control Sublayer , 2008 .
[5] K.J.R. Liu,et al. Attacks on Trust Evaluation in Distributed Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[6] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[7] Arshad Jhumka,et al. A Simple Trust model for On-Demand Routing in Mobile Ad-Hoc Networks , 2008, IDC.
[8] Ramanathan V. Guha,et al. Propagation of trust and distrust , 2004, WWW '04.
[9] R. E. Khayata,et al. A distributed medium access protocol for wireless LANs , 1994, Proceedings of 1994 28th Asilomar Conference on Signals, Systems and Computers.
[10] Ismet Erkmen,et al. Fuzzy dynamic programming , 1994, Proceedings of MELECON '94. Mediterranean Electrotechnical Conference.
[11] Zhiping Jia,et al. A Subjective Trust Management Model Based on AHP for MANETs , 2011, 2011 International Conference on Network Computing and Information Security.
[12] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[13] Chris McDonald,et al. Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..
[14] Zhiping Jia,et al. Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..
[15] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[16] Tharam S. Dillon,et al. Fuzzy nature of trust and dynamic trust modeling in service oriented environments , 2005, SWS '05.
[17] Richard Bellman,et al. Decision-making in fuzzy environment , 2012 .
[18] Amitava Datta,et al. Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.
[19] Christian Damsgaard Jensen,et al. Trust-Based Route Selection in Dynamic Source Routing , 2006, iTrust.
[20] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[21] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[22] Chris McDonald,et al. Reliable Routing in Ad Hoc Networks using Direct Trust Mechanisms , 2008 .
[23] M.H. Durad,et al. Two Novel Trust Evaluation Algorithms , 2006, 2006 International Conference on Communications, Circuits and Systems.
[24] Zhiping Jia,et al. Fuzzy Dynamic Programming Based Trusted Routing Decision in Mobile Ad Hoc Networks , 2008, 2008 Fifth IEEE International Symposium on Embedded Computing.
[25] Munindar P. Singh,et al. An evidential model of distributed reputation management , 2002, AAMAS '02.
[26] T. Saaty,et al. The Analytic Hierarchy Process , 1985 .
[27] Zhu Han,et al. Trust modeling and evaluation in ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[28] Paolo Santi,et al. The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[29] L. Litwin. The medium access control sublayer , 2001 .
[30] L. Mui,et al. A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[31] Guo Wei,et al. Dynamic trust evaluation based routing model for ad hoc networks , 2005, Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005..
[32] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[33] Luiz A. DaSilva,et al. A reputation-based mechanism for isolating selfish nodes in ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[34] Lik Mui,et al. Computational models of trust and reputation: agents, evolutionary games, and social networks , 2002 .
[35] Georgios Efthymios Theodorakopoulos,et al. Distributed Trust Evaluation in Ad-Hoc Networks , 2004 .
[36] J. Martin Leo Manickam,et al. Fuzzy Based Trusted Ad Hoc On-demand Distance Vector Routing Protocol for MANET , 2007, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007).