Self-observation and recommendation based trust model with defense scheme for wireless ad hoc network

[1]  Francesco Palmieri,et al.  Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification , 2016, Soft Computing.

[2]  Keshav P. Dahal,et al.  Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.

[3]  Ning Liu,et al.  An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[4]  Ravinder Singh,et al.  Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET , 2017, Cluster Computing.

[5]  Masoud Sabaei,et al.  An Efficient Scheme to Motivate Cooperation in Mobile Ad hoc Networks , 2007, International Conference on Networking and Services (ICNS '07).

[6]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[7]  Xue Liu,et al.  A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.

[8]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[9]  Yongguang Zhang,et al.  Security in Mobile Ad-Hoc Networks , 2005 .

[10]  Zheng Yan,et al.  Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .

[11]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[12]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[13]  Niki Pissinou,et al.  Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks , 2004, NETWORKING.

[14]  Francesco Palmieri,et al.  Detecting unfair recommendations in trust-based pervasive environments , 2019, Inf. Sci..

[15]  Ivan Stojmenovic,et al.  MOBILE AD HOC NETWORKING : THE CUTTING EDGE DIRECTIONS , 2012 .

[16]  Anupam Joshi,et al.  Security Through Collaboration and Trust in MANETs , 2012, Mob. Networks Appl..

[17]  Meng Wu,et al.  A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).

[18]  Peng Liu,et al.  A Novel Hybrid Trust Management Framework for MANETs , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.

[19]  P. Bharathisindhu,et al.  An improved model based on genetic algorithm for detecting intrusion in mobile ad hoc network , 2018, Cluster Computing.

[20]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[21]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[22]  Otto Carlos Muniz Bandeira Duarte,et al.  Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.

[23]  Uthman A. Baroudi,et al.  Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks , 2009, IET Commun..

[24]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[25]  Isaac Woungang,et al.  Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..