A Mobility-Aware Trust Management Scheme for Emergency Communication Networks Using DTN
暂无分享,去创建一个
Haitham S. Cruickshank | Ao Lei | Philip Michael Asuquo | Chibueze P. Anyigor Ogah | Kunle Olutomilayo
[1] Keshav P. Dahal,et al. Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.
[2] Kazumasa Takami,et al. Safety information gathering via information carriers through a DTN in a disaster-stricken area , 2013, 2013 International Conference on ICT Convergence (ICTC).
[3] Jörg Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.
[4] Indranil Sengupta,et al. Approach for modelling trust in cluster-based wireless ad hoc networks , 2014, IET Networks.
[5] Haitham S. Cruickshank,et al. A collaborative trust management scheme for emergency communication using delay tolerant networks , 2016, 2016 8th Advanced Satellite Multimedia Systems Conference and the 14th Signal Processing for Space Communications Workshop (ASMS/SPSC).
[6] Vinton G. Cerf,et al. Delay-Tolerant Networking Architecture , 2007, RFC.
[7] Jiannong Cao,et al. Self-Supported Cooperative Networking for Emergency Services in Multi-Hop Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.
[8] Jin-Hee Cho,et al. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[9] Bharat K. Bhargava,et al. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[10] Elmar Gerhards-Padilla,et al. Modeling mobility in disaster area scenarios , 2009, Perform. Evaluation.
[11] Tetsuya Shigeyasu,et al. Message Relay Decision Algorithm to Improve Message Delivery Ratio in DTN-Based Wireless Disaster Information Systems , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.
[12] Meng Wu,et al. Cooperative communications based on trust model for mobile ad hoc networks , 2010, IET Inf. Secur..
[13] Zhenfu Cao,et al. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .
[14] Audun Jøsang,et al. Optimal Trust Network Analysis with Subjective Logic , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.
[15] Jörg Ott,et al. Working day movement model , 2008, MobilityModels '08.
[16] Yutaka Arakawa,et al. DTN MapEx: Disaster area mapping through distributed computing over a Delay Tolerant Network , 2015, 2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU).
[17] Ellen W. Zegura,et al. Serendipity: enabling remote computing among intermittently connected mobile devices , 2012, MobiHoc '12.
[18] Feng Xia,et al. A Cooperative Watchdog System to Detect Misbehavior Nodes in Vehicular Delay-Tolerant Networks , 2015, IEEE Transactions on Industrial Electronics.
[19] Jie Wu,et al. Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.