Routing security scheme based on reputation evaluation in hierarchical ad hoc networks
暂无分享,去创建一个
[1] Lei Guo,et al. A New Node Role-Based Reputation Model in Hierarchical Ad Hoc Networks , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[2] Xue Liu,et al. A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.
[3] Dimitrios Vogiatzis,et al. Security and Cooperation in clustered mobile ad hoc networks with centralized supervision , 2006, IEEE Journal on Selected Areas in Communications.
[4] Yacine Challal,et al. Reliable and fully distributed trust model for mobile ad hoc networks , 2009, Comput. Secur..
[5] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[6] Magdy S. El-Soudani,et al. A Survey on Trust and Reputation Schemes in Ad Hoc Networks , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[7] Todd R. Andel,et al. Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols , 2008, Electron. Notes Theor. Comput. Sci..
[8] Deep Medhi,et al. A secure group key management scheme for hierarchical mobile ad hoc networks , 2008, Ad Hoc Networks.
[9] Meng-Yen Hsieh,et al. Adaptive security design with malicious node detection in cluster-based sensor networks , 2007, Comput. Commun..
[10] Jean-Yves Le Boudec,et al. Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[11] Brian L. Mark,et al. E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks , 2009, Ad Hoc Networks.
[12] Christian Damsgaard Jensen,et al. Trust Evolution Policies for Security in Collaborative Ad Hoc Applications , 2006, STM.
[13] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[14] Prabir Bhattacharya,et al. A game-theoretic intrusion detection model for mobile ad hoc networks , 2008, Comput. Commun..
[15] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[16] Yu-Lung Lo,et al. A unified framework for cluster manager election and clustering mechanism in mobile ad hoc networks , 2008, Comput. Stand. Interfaces.