Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach
暂无分享,去创建一个
[1] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[2] Jean-Yves Le Boudec,et al. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[3] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[4] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[5] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[6] Ahmad Khonsari,et al. Misbehavior resilient multi-path data transmission in mobile ad-hoc networks , 2006, SASN '06.
[7] Brian L. Mark,et al. Robust cooperative trust establishment for MANETs , 2006, SASN '06.
[8] Dharma P. Agrawal,et al. SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[9] Anupam Joshi,et al. Security through Collaboration in MANETs , 2008, CollaborateCom.
[10] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[11] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[12] Timothy W. Finin,et al. A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.
[13] Timothy W. Finin,et al. Policy-Based Malicious Peer Detection in Ad Hoc Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[14] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[15] Chris J. Mitchell,et al. Security Vulnerabilities in Ad Hoc Networks , 2003 .
[16] Stephan Eidenbenz,et al. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.
[17] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[18] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[19] Anupam Joshi,et al. Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[20] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[21] J. Parker,et al. Cross-layer analysis for detecting wireless misbehavior , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[22] M. Gerla,et al. GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998, Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS '98 (Cat. No.98TB100233).
[23] Anupam Joshi,et al. Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.
[24] Klara Nahrstedt,et al. Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments , 2004, Wirel. Pers. Commun..
[25] S. Buchegger,et al. A Robust Reputation System for Mobile Ad-hoc Networks , 2003 .