Trust and Reputation Management for Securing Collaboration in 5G Access Networks: The Road Ahead
暂无分享,去创建一个
[1] Rose Qingyang Hu,et al. Security for 5G Mobile Wireless Networks , 2018, IEEE Access.
[2] Chunhua Wang,et al. Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.
[3] Mahesh K. Marina,et al. Network Slicing in 5G: Survey and Challenges , 2017, IEEE Communications Magazine.
[4] Octavia A. Dobre,et al. Cooperation in 5G HetNets: Advanced Spectrum Access and D2D Assisted Communications , 2017, IEEE Wireless Communications.
[5] Tommy Svensson,et al. The role of small cells, coordinated multipoint, and massive MIMO in 5G , 2014, IEEE Communications Magazine.
[6] Su Yao,et al. Stochastic Cost Minimization Mechanism Based on Identifier Network for IoT Security , 2020, IEEE Internet of Things Journal.
[7] Sufian Hameed,et al. Isolating Malicious Controller(s) In Distributed Software-Defined Networks with Centralized Reputation Management , 2018, International Journal of Future Generation Communication and Networking.
[8] Rong Yu,et al. Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks , 2017, IEEE Access.
[9] Theodore S. Rappaport,et al. Millimeter Wave Mobile Communications for 5G Cellular: It Will Work! , 2013, IEEE Access.
[10] F. Richard Yu,et al. Secure Social Networks in 5G Systems with Mobile Edge Computing, Caching, and Device-to-Device Communications , 2018, IEEE Wireless Communications.
[11] Rashid Ali,et al. LWA in 5G: State-of-the-Art Architecture, Opportunities, and Research Challenges , 2018, IEEE Communications Magazine.
[12] Athanasios V. Vasilakos,et al. Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks , 2018, IEEE Transactions on Network and Service Management.
[13] Rodrigo Roman,et al. Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..
[14] Rüdiger Kapitza,et al. EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution , 2018, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[15] P. Latha,et al. Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks , 2017, Wirel. Pers. Commun..
[16] Xiupu Zhang,et al. High Capacity Mode Division Multiplexing Based MIMO Enabled All-Optical Analog Millimeter-Wave Over Fiber Fronthaul Architecture for 5G and Beyond , 2019, IEEE Access.
[17] Romano Fantacci,et al. Cognitive Spectrum Sharing: An Enabling Wireless Communication Technology for a Wide Use of Smart Systems , 2016, Future Internet.
[18] Paul D. Mitchell,et al. Reputation routing to avoid sybil attacks in wireless sensor networks using distributed beamforming , 2011, 2011 8th International Symposium on Wireless Communication Systems.
[19] Victor C. M. Leung,et al. Trust management for secure cognitive radio vehicular ad hoc networks , 2019, Ad Hoc Networks.
[20] Amr Tolba,et al. Trust-based neighbor selection using activation function for secure routing in wireless sensor networks , 2018, Journal of Ambient Intelligence and Humanized Computing.
[21] Mee Hong Ling,et al. Reinforcement learning-based trust and reputation model for cluster head selection in cognitive radio networks , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).
[22] Victor C. M. Leung,et al. Blockchain-Based Decentralized Trust Management in Vehicular Networks , 2019, IEEE Internet of Things Journal.
[23] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[24] Dong In Kim,et al. Incentivizing Consensus Propagation in Proof-of-Stake Based Consortium Blockchain Networks , 2019, IEEE Wireless Communications Letters.
[25] Victor C. M. Leung,et al. Network Slicing Based 5G and Future Mobile Networks: Mobility, Resource Management, and Challenges , 2017, IEEE Communications Magazine.
[26] AKHIL GUPTA,et al. A Survey of 5G Network: Architecture and Emerging Technologies , 2015, IEEE Access.
[27] Tanesh Kumar,et al. Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.
[28] Robert W. Heath,et al. Secure Communications in Millimeter Wave Ad Hoc Networks , 2016, IEEE Transactions on Wireless Communications.
[29] Mohsen Guizani,et al. Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things , 2018, 2018 IEEE 43rd Conference on Local Computer Networks (LCN).
[30] Shahid Mumtaz,et al. Millimeter-Wave Massive MIMO Communication for Future Wireless Systems: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[31] Jie Zhang,et al. MASA: Multi-Agent Subjectivity Alignment for Trustworthy Internet of Things , 2018, 2018 21st International Conference on Information Fusion (FUSION).
[32] Godwin G. Udo. Using analytic hierarchy process to analyze the information technology outsourcing decision , 2000, Ind. Manag. Data Syst..
[33] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[34] Qiang Ye,et al. Exploiting Secure and Energy-Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks , 2016, IEEE Transactions on Wireless Communications.
[35] Aamir Saeed Malik,et al. Trust management system in wireless sensor networks: design considerations and research challenges , 2015, Trans. Emerg. Telecommun. Technol..
[36] Bin Han,et al. A Comprehensive Survey of RAN Architectures Toward 5G Mobile Communication System , 2019, IEEE Access.
[37] Shikhamoni Nath,et al. Can Clustering be Used to Detect Intrusion During Spectrum Sensing in Cognitive Radio Networks? , 2018, IEEE Systems Journal.
[38] Abhimanyu Gosain,et al. Mobile core network redimensioning for efficient resource utilization , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[39] Ziyan Jia,et al. An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things , 2017, Wirel. Pers. Commun..
[40] Leïla Azouz Saïdane,et al. Trust management in cognitive radio networks: A survey , 2018, Int. J. Netw. Manag..
[41] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[42] Antonio Manzalini,et al. Horizon 2020 and Beyond: On the 5G Operating System for a True Digital Society , 2015, IEEE Vehicular Technology Magazine.
[43] Aduwati Sali,et al. Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS) , 2017, Comput. Commun..
[44] Ekram Hossain,et al. Multi-Tier Drone Architecture for 5G/B5G Cellular Networks: Challenges, Trends, and Prospects , 2017, IEEE Communications Magazine.
[45] Navrati Saxena,et al. Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.
[46] Wolfgang Kellerer,et al. CoMP clustering and backhaul limitations in cooperative cellular mobile access networks , 2012, Pervasive Mob. Comput..
[47] Nadeem Javaid,et al. Clustering Depth Based Routing for Underwater Wireless Sensor Networks , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).
[48] Athanasios V. Vasilakos,et al. A security and trust framework for virtualized networks and software-defined networking , 2016, Secur. Commun. Networks.
[49] Athanasios V. Vasilakos,et al. Security in Software-Defined Networking: Threats and Countermeasures , 2016, Mobile Networks and Applications.
[50] Rem W. Collier,et al. A Survey of Clustering Techniques in WSNs and Consideration of the Challenges of Applying Such to 5G IoT Scenarios , 2017, IEEE Internet of Things Journal.
[51] Hammad Afzal,et al. SS7 Vulnerabilities—A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks , 2020, IEEE Communications Surveys & Tutorials.
[52] Sherali Zeadally,et al. Comparative study of trust and reputation systems for wireless sensor networks , 2013, Secur. Commun. Networks.
[53] Qimei Cui,et al. Evolution of Limited-Feedback CoMP Systems from 4G to 5G: CoMP Features and Limited-Feedback Approaches , 2014, IEEE Vehicular Technology Magazine.
[54] Matthew R. McKay,et al. Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks , 2013, IEEE Transactions on Information Forensics and Security.
[55] Qin Li,et al. A Reputation-Based Announcement Scheme for VANETs , 2012, IEEE Transactions on Vehicular Technology.
[56] Chunyan Miao,et al. A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.
[57] Lujain Dabouba,et al. Millimeter Wave Mobile Communication for 5 G Cellular , 2017 .
[58] Sungchang Lee,et al. Implicit User Trust Modeling Based on User Attributes and Behavior in Online Social Networks , 2019, IEEE Access.
[59] Ming Xiao,et al. Performance Analysis of Interference and Eavesdropping Immunity in Narrow Beam mmWave Networks , 2018, IEEE Access.
[60] Ji Wang,et al. Trust-based cooperative spectrum sensing against SSDF attacks in distributed cognitive radio networks , 2016, 2016 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR 2016).