Dishonest recommendation attacks in wireless sensor networks: A survey
暂无分享,去创建一个
[1] Huafeng Wu,et al. Agent-based Trust Model in Wireless Sensor Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[2] Chunyan Miao,et al. A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.
[3] Roberto Di Pietro,et al. Clone wars: Distributed detection of clone attacks in mobile WSNs , 2014, J. Comput. Syst. Sci..
[4] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[5] Félix Gómez Mármol,et al. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.
[6] T.A. Zia,et al. Reputation-based trust management in wireless sensor networks , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[7] Rastko R. Selmic,et al. Secure Packet Transfer in Wireless Sensor Networks - A Trust-based Approach , 2011, ICON 2011.
[8] Sherali Zeadally,et al. Comparative study of trust and reputation systems for wireless sensor networks , 2013, Secur. Commun. Networks.
[9] Labraoui Nabila,et al. The MCD Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks , 2014, 2014 International Conference on Advanced Networking Distributed Systems and Applications.
[10] Jim Esch. Prolog to A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proc. IEEE.
[11] Guangjie Han,et al. Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..
[12] Hosein Marzi,et al. An Enhanced Bio-inspired Trust and Reputation Model for Wireless Sensor Network , 2013, ANT/SEIT.
[13] Sajal K. Das,et al. ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2012, IEEE Transactions on Dependable and Secure Computing.
[14] Huafeng Wu,et al. Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .
[15] Brian L. Mark,et al. A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.
[16] Brian L. Mark,et al. E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks , 2009, Ad Hoc Networks.
[17] Sneha Kumar Kasera,et al. Statistical trust establishment in wireless sensor networks , 2007, 2007 International Conference on Parallel and Distributed Systems.
[18] Edwin Prem,et al. A Survey on Detecting Selfish Nodes in Wireless Sensor Networks Using Different Trust Methodologies , 2011 .
[19] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[20] Akbar Ghaffarpour Rahbar,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[21] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[22] S. Buchegger,et al. A Robust Reputation System for Mobile Ad-hoc Networks , 2003 .
[23] Juan Manuel González Nieto,et al. RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[24] Avinash Srinivasan,et al. iTrust: an integrated trust framework for wireless sensor networks , 2010, SAC '10.
[25] A. Jøsang,et al. Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .
[26] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[27] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[28] Guangjie Han,et al. A Reliable Approach of Establishing Trust for Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[29] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[30] S. Challa,et al. Trust Management in Wireless Sensor Networks , 2007 .
[31] Djamal Zeghlache,et al. Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..
[32] Ioannis Papaefstathiou,et al. DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS , 2010 .
[33] Panagiotis Karkazis,et al. DESIGN AND IMPLEMENTATION OF A TRUST -AWARE ROUTING PROTOCOL FOR LARGE WSN S , 2010 .
[34] Ling Liu,et al. A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.
[35] Haiguang Chen,et al. Task-based Trust Management for Wireless Sensor Networks , 2009 .
[36] K. Vijaya,et al. Improving resilience and revocation by mitigating bad mouthing attacks in Wireless Sensor Networks , 2013 .
[37] Félix Gómez Mármol,et al. Security threats scenarios in trust and reputation models for distributed systems , 2009, Comput. Secur..
[38] Rodrigo Roman,et al. Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..
[39] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[40] Kai Hwang,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[41] G. Edwin Prem Kumar,et al. A Comprehensive Overview on Application of Trust and Reputation in Wireless Sensor Network , 2012 .
[42] Yuqing Zhang,et al. Dealing with dishonest recommendation: The trials in reputation management court , 2012, Ad Hoc Networks.
[43] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[44] Chrysanthos Dellarocas,et al. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.
[45] Sok Sien. Choy,et al. Security in mobile ad hoc networks , 2000 .
[46] K.J.R. Liu,et al. Attacks on Trust Evaluation in Distributed Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[47] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[48] Hyunsoo Yoon,et al. Trust evaluation model for wireless sensor networks , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..
[49] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[50] Xiang Zhou,et al. A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.
[51] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[52] Jie Wu,et al. A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[53] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[54] N. Pissinou,et al. A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.
[55] Yang Xiang,et al. A novel multiple-level trust management framework for wireless sensor networks , 2014, Comput. Networks.
[56] Chunyan Miao,et al. Towards a trust aware cognitive radio architecture , 2009, MOCO.
[57] Niki Pissinou,et al. Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks , 2011, Int. J. Netw. Secur..
[58] Audun Jøsang,et al. Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review , 2013, IFIPTM.
[59] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.