Trust Management for Defending On-Off Attacks
暂无分享,去创建一个
[1] R. Srikant,et al. DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.
[2] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[3] Zhu Han,et al. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[4] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[5] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[6] Rodrigo Roman,et al. Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..
[7] Jean-Yves Le Boudec,et al. Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[8] Kanika Lakhani,et al. A Novel Method for Intrusion Detection System to Enhance Security in Ad hoc Network , 2010, ArXiv.
[9] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[10] Xiang Mao,et al. Effect of on/off misbehavior on overhearing based cooperation scheme for MANET , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[11] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[12] Huda B. Hubboub,et al. Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks , 2012 .
[13] Xiaolong Xu,et al. METrust: A mutual evaluation-based trust model for P2P networks , 2012, Int. J. Autom. Comput..
[14] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[15] Chunyan Miao,et al. Towards a trust aware cognitive radio architecture , 2009, MOCO.
[16] Dirk Westhoff,et al. Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[17] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[18] Ben-Jye Chang,et al. Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.
[19] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[20] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[21] Stephen S. Yau,et al. A Flexible Trust Model for Distributed Service Infrastructures , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[22] Sugata Sanyal,et al. RISM - Reputation Based Intrusion Detection System for Mobile Ad hoc Networks , 2013, ArXiv.
[23] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[24] Thomas E. Anderson,et al. One Hop Reputations for Peer to Peer File Sharing Workloads , 2008, NSDI.
[25] Huafeng Wu,et al. Event-based Trust Framework Model in Wireless Sensor Networks , 2008, 2008 International Conference on Networking, Architecture, and Storage.
[26] Yu Cheng,et al. Mitigating selective forwarding attacks with a channel-aware approach in WMNS , 2010, IEEE Transactions on Wireless Communications.
[27] Ghassan O. Karame,et al. A Secure Hybrid Reputation Management System for Super-Peer Networks , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[28] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[29] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[30] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[31] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[32] S. Buchegger,et al. A Robust Reputation System for Mobile Ad-hoc Networks , 2003 .
[33] Younghun Chae. Redeemable reputation based secure routing protocol for wireless sensor networks , 2012 .
[34] Zhiping Jia,et al. A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.
[35] Markus Jakobsson,et al. A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks , 2003, Financial Cryptography.
[36] Yanheng Liu,et al. Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..
[37] Gabriel Maciá-Fernández,et al. LoRDAS: A Low-Rate DoS Attack against Application Servers , 2007, CRITIS.
[38] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.