Trust prediction and trust-based source routing in mobile ad hoc networks
暂无分享,去创建一个
Edwin Hsing-Mean Sha | Zhiping Jia | Hui Xia | Lei Ju | Xin Li | E. Sha | Zhiping Jia | Hui Xia | Xin Li | Lei Ju
[1] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[2] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[3] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[4] Diego Gambetta. Can We Trust Trust , 2000 .
[5] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[6] L. Litwin. The medium access control sublayer , 2001 .
[7] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[8] Andrew T. Campbell,et al. P-MIP: Paging Extensions for Mobile IP , 2002, Mob. Networks Appl..
[9] H Deng,et al. ROUTING SECURITY IN AD HOC NETWORKS , 2002 .
[10] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[11] Paolo Santi,et al. The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[12] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[13] Zhaoyu Liu,et al. A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..
[14] A.A. Pirzada,et al. Propagating trust in ad-hoc networks for reliable routing , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..
[15] Tharam S. Dillon,et al. Fuzzy nature of trust and dynamic trust modeling in service oriented environments , 2005, SWS '05.
[16] Christian Damsgaard Jensen,et al. Trust-Based Route Selection in Dynamic Source Routing , 2006, iTrust.
[17] Chris McDonald,et al. Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..
[18] Amitava Datta,et al. Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.
[19] Xia Wang. Intrusion Detection Techniques in Wireless Ad Hoc Networks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).
[20] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[21] K.J.R. Liu,et al. Attacks on Trust Evaluation in Distributed Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[22] S. Shanmugavel,et al. Fuzzy Based Trusted Ad hoc On-demand Distance Vector Routing Protocol for MANET , 2007 .
[23] Arshad Jhumka,et al. A Simple Trust model for On-Demand Routing in Mobile Ad-Hoc Networks , 2008, IDC.
[24] Chris McDonald,et al. Reliable Routing in Ad Hoc Networks using Direct Trust Mechanisms , 2008 .
[25] William H. Robinson,et al. A distributed intrusion detection system for resource-constrained devices in ad-hoc networks , 2010, Ad Hoc Networks.
[26] Zhiping Jia,et al. Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..
[27] Luo Junhai and Fan Mingyu. A Subjective Trust Management Model Based on Certainty-Factor for MANETs , 2010 .
[28] K. J. Ray Liu,et al. Cognitive Radio Networking and Security: Trust modeling and evaluation , 2010 .
[29] Zhiping Jia,et al. A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.
[30] Zhiping Jia,et al. Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory , 2011, IET Wirel. Sens. Syst..