An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things
暂无分享,去创建一个
Ziyan Jia | Weige Tao | Changhoon Lee | Yang Yu | Bo Xue | Yang Yu | Bo Xue | Weige Tao | Changhoon Lee | Z. Jia
[1] Luis Martínez-López,et al. Integration of a Consistency Control Module within a Consensus Model , 2008, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[2] Gong Xudong. Node behavior and identity-based trusted authentication in wireless sensor networks , 2013 .
[3] Chen Zhong,et al. Trust Management in Wireless Sensor Networks , 2008 .
[4] Qi Jing,et al. Trust Management in Wireless Sensor Networks: Trust Management in Wireless Sensor Networks , 2008 .
[5] Ahmad Khonsari,et al. Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..
[6] Wolfgang Kellerer,et al. Castor: Scalable Secure Routing for Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[7] Antonio Iera,et al. A subjective model for trustworthiness evaluation in the social Internet of Things , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[8] Athanasios V. Vasilakos,et al. ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[9] Wei Qin-fang. Detection of selective forwarding attack in the Internet of things , 2012 .
[10] Niki Pissinou,et al. Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[11] Basil S. Maglaris,et al. Towards multisensor data fusion for DoS detection , 2004, SAC '04.
[12] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[13] Subhash Challa,et al. Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks , 2010, J. Networks.
[14] Theodore B. Zahariadis,et al. A novel flexible trust management system for heterogeneous wireless sensor networks , 2009, 2009 International Symposium on Autonomous Decentralized Systems.
[15] Wenchao Huang,et al. Node behavior and identity-based trusted authentication in wireless sensor networks: Node behavior and identity-based trusted authentication in wireless sensor networks , 2013 .
[16] Tae Kyung Kim,et al. A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .
[17] Yoonmee Doh,et al. PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[18] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[19] Lawrence Carin,et al. Bayesian Compressive Sensing , 2008, IEEE Transactions on Signal Processing.
[20] Steve Hodges,et al. Prototyping Connected Devices for the Internet of Things , 2013, Computer.
[21] Xingming Sun,et al. Selective forwarding attack detection using watermark in WSNs , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[22] Guangjie Han,et al. Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..
[23] Félix Gómez Mármol,et al. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.
[24] Stefanos Gritzalis,et al. Hybrid trust and reputation management for sensor networks , 2010, Wirel. Networks.
[25] Isaac Woungang,et al. Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..
[26] Chi-Yin Chow,et al. On Efficient and Scalable Support of Continuous Queries in Mobile Peer-to-Peer Environments , 2011, IEEE Transactions on Mobile Computing.
[27] Enrique Herrera-Viedma,et al. A Consensus Model for Group Decision Making Problems with Unbalanced Fuzzy Linguistic Information , 2009, Int. J. Inf. Technol. Decis. Mak..
[28] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[29] Yenumula Reddy,et al. Detection of Packet Dropping in Wireless Sensor Networks , 2010, 2010 Seventh International Conference on Information Technology: New Generations.