Security and Trust in Opportunistic Networks – A Survey
暂无分享,去创建一个
[1] Cristina Nita-Rotaru,et al. JANUS: towards robust and malicious resilient routing in hybrid wireless networks , 2004, WiSe '04.
[2] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[3] Mohammad S. Obaidat,et al. Trust-based Security Protocol against blackhole attacks in opportunistic networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[4] Franck Legendre,et al. Social Trust in Opportunistic Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.
[5] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[6] Iwao Sasase,et al. Trust level evaluation for communication paths in MANETs by using Attribute Certificates , 2010, International Conference on Communications and Electronics 2010.
[7] Zygmunt J. Haas,et al. The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way) , 2003, MobiHoc '03.
[8] Nidal Nasser,et al. Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[9] Wang Bo,et al. Trust-based minimum cost opportunistic routing for Ad hoc networks , 2011 .
[10] Yue Wu,et al. Security and trust management in opportunistic networks: a survey , 2015, Secur. Commun. Networks.
[11] Xin Zhang,et al. Packet-dropping adversary identification for data plane security , 2008, CoNEXT '08.
[12] Hiroshi Shigeno,et al. PTrust: Provisional Value based trust for reputation aggregation in peer-to-peer networks , 2011, 2011 1st International Symposium on Access Spaces (ISAS).
[13] Guo Yajun,et al. Establishing Trust Relationship in Mobile Ad-Hoc Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[14] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[15] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[16] Khaled A. Harras,et al. Social-Based Trust in Mobile Opportunistic Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[17] Zhenhua Tan,et al. A New Method of Trust Inference Based on Markov Model for Peer-to-Peer Network , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.
[18] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[19] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[20] Ananthram Swami,et al. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..
[21] Zhu Han,et al. Trust modeling and evaluation in ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[22] Ahmed Helmy,et al. PROTECT: proximity-based trust-advisor using encounters for mobile societies , 2010, IWCMC.
[23] Levente Buttyán,et al. Barter-based cooperation in delay-tolerant personal wireless networks , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[24] Jie Wu,et al. Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.
[25] Peng Yang,et al. Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[26] Gianluca Dini,et al. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network , 2012, Ad Hoc Networks.
[27] Elisa Bertino,et al. A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.
[28] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[29] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[30] Jianping Wu,et al. TrustP2PNet: P2P Social Network with Admission Control Model based on Trust , 2013 .
[31] Abderrahmane Baadache,et al. Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..
[32] Sajal K. Das,et al. A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.
[33] Jie Yang,et al. MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[34] Ma Ke,et al. A new packet dropping policy in delay tolerant network , 2010, 2010 IEEE 12th International Conference on Communication Technology.
[35] Jaydip Sen,et al. A distributed protocol for detection of packet dropping attack in mobile ad hoc networks , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.
[36] Donald F. Towsley,et al. Anti-localization anonymous routing for Delay Tolerant Network , 2010, Comput. Networks.
[37] Mun Choon Chan,et al. MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network , 2010, 2010 Proceedings IEEE INFOCOM.
[38] Zhenfu Cao,et al. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .
[39] Xue Liu,et al. A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.
[40] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[41] Yong Wang,et al. Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.
[42] Marianne Azer,et al. A Novel Proximity Based Trust Model for Opportunistic Networks , 2013, 2013 International Conference on Availability, Reliability and Security.
[43] Karin Anna Hummel,et al. Preventing spam in opportunistic networks , 2014, Comput. Commun..
[44] Soo Young Shin,et al. Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation , 2012, 2012 International Conference on ICT Convergence (ICTC).
[45] Vicky H. Mak-Hau,et al. Packet Faking Attack: A Novel Attack and Detection Mechanism in OppNets , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.
[46] JianHua Song,et al. A reputation-based scheme against malicious packet dropping for mobile ad hoc networks , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.
[47] Shivakant Mishra,et al. CenWits: a sensor-based loosely coupled search and rescue system using witnesses , 2005, SenSys '05.
[48] Zhu Han,et al. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[49] Indranil Sengupta,et al. Approach for modelling trust in cluster-based wireless ad hoc networks , 2014, IET Networks.
[50] Peng Yang,et al. A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[51] Robert Beverly,et al. Toward anonymity in Delay Tolerant Networks: Threshold Pivot Scheme , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[52] Jie Yang,et al. Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[53] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[54] Yang Xiang,et al. A novel multiple-level trust management framework for wireless sensor networks , 2014, Comput. Networks.
[55] Brejesh Lall,et al. Privacy Protection Through k.anonymity in Location.based Services , 2012 .
[56] Lorena González-Manzano,et al. Security Models in Vehicular Ad-hoc Networks: A Survey , 2014 .
[57] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[58] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[59] Edson dos Santos Moreira,et al. Trust Management in Opportunistic Networks , 2010, 2010 Ninth International Conference on Networks.
[60] Robin Doss,et al. Defense against packet dropping attacks in opportunistic networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[61] Erman Ayday,et al. Trust management and adversary detection for delay tolerant networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.