Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor
暂无分享,去创建一个
Jing Hu | Xiaohong Li | Zhiyong Feng | Guangquan Xu | Jiaojiao Song | Zhiyong Feng | Guangquan Xu | Jing Hu | Xiaohong Li | Jiaojiao Song
[1] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[2] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[3] Xu Huang,et al. A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[4] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[5] Low Tang Jung,et al. Hybrid scheme for trust management in pervasive computing , 2012, 2012 International Conference on Information Retrieval & Knowledge Management.
[6] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[7] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[8] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[9] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[10] Weisong Shi,et al. Analysis of ratings on trust inference in open environments , 2008, Perform. Evaluation.
[11] Kamlesh Gupta,et al. Security issues in wireless sensor networks , 2010 .
[12] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[13] Kalpana Sharma,et al. Wireless Sensor Networks: An Overview on its Security Threats , 2010 .
[14] Anastasios A. Economides,et al. Wireless sensor network security visualization , 2012, 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems.
[15] Zhiping Jia,et al. A Subjective Trust Management Model Based on AHP for MANETs , 2011, 2011 International Conference on Network Computing and Information Security.
[16] Ali Farrokhtala,et al. Security in Wireless Sensor Networks: Issues and challanges , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).
[17] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[18] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[19] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[20] M. Salem. An Efficient Distributed Trust Model for Wireless Sensor Networks , 2016 .
[21] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[22] L. Mui,et al. A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[23] Fangmin Sun,et al. A Review of Attacks and Security Protocols for Wireless Sensor Networks , 2014, J. Networks.
[24] Peter C. Mason,et al. Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.
[25] Celeste Campo,et al. PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .
[26] Joan Feigenbaum,et al. KeyNote : Trust management for public-key infrastructures. Discussion , 1999 .
[27] Tian Chun. A Novel Super-Peer Based Trust Model for Peer-to-Peer Networks , 2010 .
[28] Young-Koo Lee,et al. A trust model for ubiquitous systems based on vectors of trust values , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).