Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
暂无分享,去创建一个
Yacine Challal | Abdelmadjid Bouabdallah | Mawloud Omar | A. Bouabdallah | Y. Challal | Mawloud Omar
[1] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[2] Liviu Iftode,et al. Locality driven key management architecture for mobile ad-hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).
[3] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[4] Joseph P. Macker,et al. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.
[5] Ivan Stojmenovic,et al. Handbook of Wireless Networks and Mobile Computing , 2002 .
[6] Charles E. Perkins,et al. Ad Hoc Networking , 2001 .
[7] N. Vimala,et al. Distributed Key Management Scheme for Mobile Ad-Hoc Network-A Survey , 2010 .
[8] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[9] Silvia Giordano,et al. Mobile ad hoc networks , 2002 .
[10] Philippe Jacquet,et al. OLSR Performance Measurement in a Military Mobile Ad-hoc Network , 2004, ICDCS Workshops.
[11] Kenneth G. Paterson,et al. ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..
[12] Yacine Challal,et al. NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[13] Shih-Lin Wu,et al. Wireless Ad Hoc Networking : Personal-Area, Local-Area, and the Sensory-Area Networks , 2007 .
[14] Johann van der Merwe,et al. A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.
[15] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[16] P.H.J. Chong,et al. A survey of clustering schemes for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[17] Adi Shamir,et al. How to share a secret , 1979, CACM.
[18] Srdjan Capkun,et al. Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.
[19] Bart Preneel,et al. Authenticated and efficient key management for wireless ad hoc networks , 2003 .
[20] David Bull,et al. Proceedings of the Vehicular Technology Conference , 2000 .
[21] Juan-Carlos Cano,et al. A distributed admission control system for MANET environments supporting multipath routing protocols , 2007, Microprocess. Microsystems.
[22] Weihong Wang,et al. Self-managed heterogeneous certification in mobile ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[23] I. Sasase,et al. On demand distributed public key management for wireless ad hoc networks , 2005, PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005..
[24] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[25] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[26] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[27] Jordi Forné,et al. Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks , 2007, Comput. Commun..
[28] Alice Bob,et al. The PGP Trust Model , 2005 .
[29] Min-Shiang Hwang,et al. A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..
[30] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[31] Brian L. Mark,et al. E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks , 2009, Ad Hoc Networks.
[32] I. Sasase,et al. On Demand Distributed Public Key Management without Considering Routing Tables for Wireless Ad Hoc Networks , 2005, 6th Asia-Pacific Symposium on Information and Telecommunication Technologies.
[33] Xue Liu,et al. A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.
[34] Chin-Chen Chang,et al. A robust certification service for highly dynamic MANET in emergency tasks , 2009 .
[35] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[36] B. Aziz,et al. A Recent Survey on Key Management Schemes in MANET , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.
[37] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[38] Giannis F. Marias,et al. Cooperation enforcement schemes for MANETs: a survey: Research Articles , 2006 .
[39] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .
[40] Giannis F. Marias,et al. Cooperation enforcement schemes for MANETs: a survey , 2006, Wirel. Commun. Mob. Comput..
[41] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[42] Mehdi Dehghan,et al. A secure credit-based cooperation stimulating mechanism for MANETs using hash chains , 2009, Future Gener. Comput. Syst..
[43] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[44] Hiroyuki Seki,et al. Certificate Chain Discovery in Web of Trust for Ad Hoc Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[45] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[46] R. Dorf,et al. The handbook of ad hoc wireless networks , 2003 .
[47] Iwao Sasase,et al. Public key management scheme with certificate management node for wireless ad hoc networks , 2006 .
[48] Panagiotis Papadimitratos,et al. Securing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.
[49] Siu-Ming Yiu,et al. Providing distributed certificate authority service in cluster-based mobile ad hoc networks , 2007, Comput. Commun..
[50] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[51] Robert W. Shirey,et al. Internet Security Glossary , 2000, RFC.
[52] D. Toshniwal,et al. Dynamic Support for Distributed Certification Authority in Mobile Ad Hoc Networks , 2006, 2006 International Conference on Hybrid Information Technology.
[53] Yacine Challal,et al. Reliable and fully distributed trust model for mobile ad hoc networks , 2009, Comput. Secur..
[54] Marco Ajmone Marsan,et al. Stochastic Petri nets: an elementary introduction , 1988, European Workshop on Applications and Theory in Petri Nets.
[55] Erman Ayday,et al. A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks , 2010, Ad Hoc Networks.
[56] Georgios Kambourakis,et al. Efficient Certification Path Discovery for MANET , 2010, EURASIP J. Wirel. Commun. Netw..
[57] Yong Zhang,et al. A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.
[58] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[59] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[60] Patrick Th. Eugster,et al. DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for ad hoc networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[61] Haiyun Luo,et al. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .
[62] Peter J. Haas,et al. Stochastic Petri Nets: Modelling, Stability, Simulation , 2002 .
[63] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[64] Raja Datta,et al. Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.
[65] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[66] Roberto Di Pietro,et al. Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..