Performance Analysis of Trust-Based Node Evaluation Schemes in Wireless and Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Azzedine Boukerche,et al. A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..
[2] Xiaoyan Hong,et al. A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.
[3] Azzedine Boukerche,et al. Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[4] Azzedine Boukerche,et al. Performance Evaluation of an Anonymous Routing Protocol using Mobile Agents for Wireless Ad hoc Networks , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).
[5] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[6] Dai Hongjun,et al. An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks , 2008, ICESS.
[7] Marcin Seredynski,et al. Evolution of cooperation in ad hoc networks under game theoretic model , 2006, MobiWac '06.
[8] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[9] Ian F. Akyildiz,et al. Mobility Management in Next Generation Wireless Systems , 1999, ICCCN.
[10] Heejo Lee,et al. A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[11] Azzedine Boukerche. Handbook of Algorithms for Wireless Networking and Mobile Computing , 2005 .
[12] Xu Li,et al. A Trust Cluster Based Key Management Protocol for Ad hoc Networks , 2007, 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID).
[13] Stephen B. Wicker,et al. Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[14] Shin Yokoyama,et al. Evaluation of the Impact of Selfish Nodes in Ad Hoc Networks and Detection and Countermeasure Methods , 2006, 7th International Conference on Mobile Data Management (MDM'06).
[16] Dan M. Nessett. Factors Affecting Distributed System Security , 1986, 1986 IEEE Symposium on Security and Privacy.
[17] Azzedine Boukerche,et al. Algorithms and Protocols for Wireless Sensor Networks , 2008, Wiley series on parallel and distributed computing.
[18] Guangjie Han,et al. A Reliable and Efficient Approach of Establishing Trust for Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Intelligent Computer Communication and Processing.