Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
暂无分享,去创建一个
Ping Li | Yanli Yu | Wanlei Zhou | Keqiu Li | Wanlei Zhou | Keqiu Li | Ping Li | Yanli Yu
[1] Wang-Chien Lee,et al. Using sensorranks for in-network detection of faulty readings in wireless sensor networks , 2007, MobiDE '07.
[2] Daniele Quercia,et al. B-Trust: Bayesian Trust Framework for Pervasive Computing , 2006, iTrust.
[3] Rung Ching Chen,et al. A new method for intrusion detection on hierarchical wireless sensor networks , 2009, ICUIMC '09.
[4] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[5] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[6] Saurabh Bagchi,et al. TIBFIT: trust index based fault tolerance for arbitrary data faults in sensor networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[7] George D. Stamoulis,et al. Achieving Honest Ratings with Reputation-Based Fines in Electronic Markets , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[8] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[9] Ahmed Helmy,et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[10] Bo Yu,et al. Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[11] Deborah Estrin,et al. Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .
[12] Qinyuan Feng,et al. RepTrap: a novel attack on feedback-based reputation systems , 2008, SecureComm.
[13] Ming Zhou,et al. Online reputation systems: Design and strategic practices , 2008, Decis. Support Syst..
[14] Audun Jøsang,et al. Trust network analysis with subjective logic , 2006, ACSC.
[15] Venkata M. Mulpuru,et al. Detecting selective forwarding attacks in wireless sensor networks , 2008 .
[16] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[17] S. Challa,et al. Can we trust trusted nodes in wireless sensor networks? , 2008, 2008 International Conference on Computer and Communication Engineering.
[18] Juan Manuel González Nieto,et al. RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[19] B SrivastavaMani,et al. Reputation-based framework for high integrity sensor networks , 2008 .
[20] Azzedine Boukerche,et al. A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..
[21] Joseph Y. Halpern,et al. Updating Probabilities , 2002, UAI.
[22] Suat Ozdemir,et al. Secure and reliable data aggregation for wireless sensor networks , 2007 .
[23] Jie Wu,et al. A Novel k-Parent Flooding Tree for Secure and Reliable Broadcasting in Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[24] Cristina Alcaraz,et al. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.
[25] Vijay Varadharajan,et al. A Hybrid Trust Model for Enhancing Security in Distributed Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[26] Félix Gómez Mármol,et al. TRIMS, a privacy-aware trust and reputation model for identity management systems , 2010, Comput. Networks.
[27] Vladimiro Sassone,et al. A Bayesian Model for Event-based Trust , 2022 .
[28] Jennifer Golbeck,et al. Investigating interactions of trust and interest similarity , 2007, Decis. Support Syst..
[29] Claudia Eckert,et al. A Reputation System for Electronic Negotiations , 2008, WOSIS.
[30] S. Quartz,et al. Getting to Know You: Reputation and Trust in a Two-Person Economic Exchange , 2005, Science.
[31] Gene Tsudik,et al. QUEST Software and , 2022 .
[32] Miodrag Potkonjak,et al. On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[33] Mm Momani,et al. Bayesian methods for modelling and management of trust in wireless sensor networks , 2008 .
[34] Yee Wei Law,et al. How to Secure a Wireless Sensor Network , 2005, 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[35] Sushil K. Prasad,et al. A distributed algorithmic framework for coverage problems in Wireless Sensor Networks , 2008, IPDPS.
[36] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[37] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[38] Jie Wu,et al. Secure and reliable broadcasting in wireless sensor networks using multi-parent trees , 2009, Secur. Commun. Networks.
[39] Bo Yu,et al. CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..
[40] R. Srikant,et al. DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.
[41] Nicholas R. Jennings,et al. A Hierarchical Bayesian Trust Model based on Reputation and Group Behaviour , 2008 .
[42] Qi Shi,et al. An Efficient Multi-Parameter Group Leader Selection Scheme for Wireless Sensor Networks , 2009, 2009 International Conference on Network and Service Security.
[43] N.R. Prasad,et al. A Security, Privacy and trust architecture for Wireless Sensor Networks , 2008, 2008 50th International Symposium ELMAR.
[44] Bernd Lahno,et al. Is Trust the Result of Bayesian Learning , 2004 .
[45] Mohamed Eltoweissy,et al. μRACER: A Reliable Adaptive Service-Driven Efficient Routing Protocol Suite for Sensor-Actuator Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[46] Zhu Han,et al. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[47] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[48] R. Mooney,et al. Impact of Similarity Measures on Web-page Clustering , 2000 .
[49] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[50] F. G. Marmol,et al. TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.
[51] Xiaoyang Sean Wang,et al. Authorization in trust management: Features and foundations , 2008, CSUR.
[52] Ling Wei,et al. A Trust Model Based on Bayesian Approach , 2005, AWIC.
[53] Margaret Martonosi,et al. Location-based trust for mobile user-generated content: applications, challenges and implementations , 2008, HotMobile '08.
[54] Rodrigo Roman,et al. A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).
[55] Uthman A. Baroudi,et al. Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks , 2009, IET Commun..
[56] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[57] K. Komathy,et al. Trust-based evolutionary game model assisting AODV routing against selfishness , 2008, J. Netw. Comput. Appl..
[58] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[59] Hyunsoo Yoon,et al. Trust Management for Resilient Wireless Sensor Networks , 2005, ICISC.
[60] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[61] Young-Koo Lee,et al. An Extended Energy Consumption Analysis of Reputation-based Trust Management Schemes of Wireless Sensor Networks , 2010, J. Networks.
[62] Peng Ning,et al. Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.
[63] Niki Pissinou,et al. Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[64] Claudio Gutierrez,et al. Survey of graph database models , 2008, CSUR.
[65] Zabih Ghassemlooy,et al. A MIMO-ANN system for increasing data rates in organic visible light communications systems , 2013, 2013 IEEE International Conference on Communications (ICC).
[66] Paul Rabinovich,et al. Secure Aggregation in Sensor Networks Using Neighborhood Watch , 2007, 2007 IEEE International Conference on Communications.