An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks
暂无分享,去创建一个
[1] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[2] Frank Y. Li,et al. Security in Mobile Wireless Sensor Networks - A Survey , 2011, J. Commun..
[3] Claudio Soriente,et al. Intrusion-Resilience in Mobile Unattended WSNs , 2010, 2010 Proceedings IEEE INFOCOM.
[4] Claudio Soriente,et al. New adversary and new threats: security in unattended sensor networks , 2009, IEEE Network.
[5] Ahmed Helmy,et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[6] Claudio Soriente,et al. POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks , 2008, 2008 Symposium on Reliable Distributed Systems.
[7] Roberto Di Pietro,et al. Epidemic data survivability in unattended wireless sensor networks , 2011, WiSec '11.
[8] Yu-Kwong Kwok,et al. A Trust-Based Geographical Routing Scheme in Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[9] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[10] N. Foukia,et al. Using Trust in Key Distribution in Wireless Sensor Networks , 2007, 2007 IEEE Globecom Workshops.
[11] Deborah Estrin,et al. GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.
[12] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[13] S. Buchegger,et al. A Robust Reputation System for Mobile Ad-hoc Networks , 2003 .
[14] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[15] Avinash Srinivasan,et al. iTrust: an integrated trust framework for wireless sensor networks , 2010, SAC '10.
[16] Luiz A. DaSilva,et al. Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks , 2010, IEEE Transactions on Computers.
[17] Gene Tsudik,et al. DISH: Distributed Self-Healing , 2008, SSS.
[18] Saurabh Bagchi,et al. TIBFIT: trust index based fault tolerance for arbitrary data faults in sensor networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[19] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[20] Claudio Soriente,et al. Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[21] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[22] Emin Gün Sirer,et al. Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.
[23] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[24] Akbar Ghaffarpour Rahbar,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[25] Mohamed Eltoweissy,et al. TARP: A Trust-Aware Routing Protocol for Sensor-Actuator Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[26] Frank Y. Li,et al. A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[27] Yacine Challal,et al. Reliable and fully distributed trust model for mobile ad hoc networks , 2009, Comput. Secur..
[28] Frank Y. Li,et al. A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing , 2009, 2009 2nd IFIP Wireless Days (WD).
[29] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[30] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[31] Frank Y. Li,et al. SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs , 2011, 2011 IEEE 36th Conference on Local Computer Networks.