Trust prediction and trust-based source routing in mobile ad hoc networks

[1]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[2]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[3]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[4]  Diego Gambetta Can We Trust Trust , 2000 .

[5]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[6]  L. Litwin The medium access control sublayer , 2001 .

[7]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[8]  Andrew T. Campbell,et al.  P-MIP: Paging Extensions for Mobile IP , 2002, Mob. Networks Appl..

[9]  H Deng,et al.  ROUTING SECURITY IN AD HOC NETWORKS , 2002 .

[10]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[11]  Paolo Santi,et al.  The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[12]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[13]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[14]  A.A. Pirzada,et al.  Propagating trust in ad-hoc networks for reliable routing , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..

[15]  Tharam S. Dillon,et al.  Fuzzy nature of trust and dynamic trust modeling in service oriented environments , 2005, SWS '05.

[16]  Christian Damsgaard Jensen,et al.  Trust-Based Route Selection in Dynamic Source Routing , 2006, iTrust.

[17]  Chris McDonald,et al.  Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..

[18]  Amitava Datta,et al.  Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.

[19]  Xia Wang Intrusion Detection Techniques in Wireless Ad Hoc Networks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).

[20]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[21]  K.J.R. Liu,et al.  Attacks on Trust Evaluation in Distributed Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[22]  S. Shanmugavel,et al.  Fuzzy Based Trusted Ad hoc On-demand Distance Vector Routing Protocol for MANET , 2007 .

[23]  Arshad Jhumka,et al.  A Simple Trust model for On-Demand Routing in Mobile Ad-Hoc Networks , 2008, IDC.

[24]  Chris McDonald,et al.  Reliable Routing in Ad Hoc Networks using Direct Trust Mechanisms , 2008 .

[25]  William H. Robinson,et al.  A distributed intrusion detection system for resource-constrained devices in ad-hoc networks , 2010, Ad Hoc Networks.

[26]  Zhiping Jia,et al.  Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..

[27]  Luo Junhai and Fan Mingyu A Subjective Trust Management Model Based on Certainty-Factor for MANETs , 2010 .

[28]  K. J. Ray Liu,et al.  Cognitive Radio Networking and Security: Trust modeling and evaluation , 2010 .

[29]  Zhiping Jia,et al.  A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.

[30]  Zhiping Jia,et al.  Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory , 2011, IET Wirel. Sens. Syst..