A fuzzy-based trust model for flying ad hoc networks (FANETs)

[1]  Zhiping Jia,et al.  A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.

[2]  Edwin Hsing-Mean Sha,et al.  Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.

[3]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[4]  Anil Kumar Verma,et al.  Experimental analysis of AODV, DSDV and OLSR routing protocol for flying adhoc networks (FANETs) , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[5]  Rutvij H. Jhaveri,et al.  Attack‐pattern discovery based enhanced trust model for secure routing in mobile ad‐hoc networks , 2017, Int. J. Commun. Syst..

[6]  J. Bezdek,et al.  FCM: The fuzzy c-means clustering algorithm , 1984 .

[7]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[8]  Peng Liu,et al.  An Objective Trust Management Framework for Mobile Ad Hoc Networks , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[9]  Ananthram Swami,et al.  Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..

[10]  Robert P. W. Duin,et al.  Feature Scaling in Support Vector Data Descriptions , 2000 .

[11]  Jia Guo,et al.  Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[12]  Rajashekhar C. Biradar,et al.  Secured routing in wireless sensor networks using fault‐free and trusted nodes , 2016, Int. J. Commun. Syst..

[13]  Ruidong Li,et al.  Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.

[14]  Hossein Jadidoleslamy TMS-HCW: a trust management system in hierarchical clustered wireless sensor networks , 2015, Secur. Commun. Networks.

[15]  Christine Julien,et al.  Pervasive Context Sharing in Magpie: Adaptive Trust-Based Privacy Protection , 2015, MobiCASE.

[16]  Fan Bai,et al.  MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles (CMU-CyLab-14-006) , 2014 .

[17]  Theodore S. Rappaport,et al.  Wireless Communications -- Principles and Practice, Second Edition. (The Book End) , 2002 .

[18]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[19]  Xiao Zhi Gao,et al.  A Hybrid Optimization Method for Fuzzy Classification Systems , 2008, 2008 Eighth International Conference on Hybrid Intelligent Systems.

[20]  Ilker Bekmezci,et al.  Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.

[21]  Guy Pujolle,et al.  Trust-Distortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[22]  A. V. Deshpande,et al.  Trust Management Model based on Fuzzy Approach for Ubiquitous Computing , 2016, Int. J. Ambient Comput. Intell..

[23]  Ernesto Damiani,et al.  Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems , 2006, J. Assoc. Inf. Sci. Technol..

[24]  Yongwei Wang,et al.  Enhancing Node Cooperation in Mobile Wireless Ad Hoc Networks with Selfish Nodes , 2008 .

[25]  Kamel Adi,et al.  Efficient certificateless web-of-trust model for public-key authentication in MANET , 2015, Comput. Commun..

[26]  Xue Liu,et al.  A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.

[27]  Yacine Rebahi,et al.  A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[28]  Nadeem Javaid,et al.  Fuzzy-Based Trust Model for Detection of Selfish Nodes in MANETs , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[29]  Joan Feigenbaum,et al.  Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.

[30]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[31]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.