A Survey of Provenance Leveraged Trust in Wireless Sensor Networks
暂无分享,去创建一个
[1] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[2] Dan Zhou. Security issues in ad hoc networks , 2003 .
[3] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[4] N. Pissinou,et al. A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.
[5] Wang Chiew Tan. Provenance in Databases: Past, Current, and Future , 2007, IEEE Data Eng. Bull..
[6] Elisa Bertino,et al. Research issues in data provenance for streaming environments , 2009, SPRINGL '09.
[7] Qing Zhang,et al. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.
[8] Yu-Kwong Kwok,et al. A Trust-Based Geographical Routing Scheme in Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[9] Audun Jøsang,et al. Analysing the Relationship between Risk and Trust , 2004, iTrust.
[10] Guillermo A. Francia. A Wireless Sensor Network , 2003, International Conference on Wireless Networks.
[11] Jie Wu,et al. A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[12] Julita Vassileva,et al. Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[13] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[14] Xiaozhou Li,et al. Efficient querying and maintenance of network provenance at internet-scale , 2010, SIGMOD Conference.
[15] Saurabh Bagchi,et al. TIBFIT: trust index based fault tolerance for arbitrary data faults in sensor networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[16] Rodrigo Roman,et al. A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).
[17] Kiyoung Kim,et al. A security framework with trust management for sensor networks , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..
[18] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[19] Ian Foster,et al. Special Issue: The First Provenance Challenge , 2008 .
[20] Yacine Rebahi,et al. A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).
[21] Yong Chen,et al. Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..
[22] Yogesh L. Simmhan,et al. Special Issue: The First Provenance Challenge , 2008, Concurr. Comput. Pract. Exp..
[23] Prasant Mohapatra,et al. PRONET: Network trust assessment based on incomplete provenance , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[24] Matt Welsh,et al. Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.
[25] Sima. Security Issues in Ad Hoc Networks , 2011 .
[26] Prasant Mohapatra,et al. Provenance-Based Information Trustworthiness Evaluation in Multi-Hop Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[27] Boon Thau Loo,et al. Provenance-Aware Declarative Secure Networks , 2007 .
[28] Elisa Bertino,et al. Trust Evaluation of Data Provenance , 2008 .
[29] Sanjay Kumar Madria,et al. Sensor networks: an overview , 2003 .
[30] B. Solhaug,et al. Why Trust is not Proportional to Risk , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[31] Jennifer Golbeck,et al. Combining Provenance with Trust in Social Networks for Semantic Web Content Filtering , 2006, IPAW.
[32] Suat Özdemir,et al. Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008, Comput. Commun..
[33] Peter Buneman,et al. Provenance in databases , 2009, SIGMOD '07.
[34] Ahmed Helmy,et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[35] G. Pulla,et al. A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .
[36] Kurt Rothermel,et al. Towards a Generic Trust Model - Comparison of Various Trust Update Algorithms , 2005, iTrust.
[37] Mark G. Terwilliger,et al. Overview of Sensor Networks , 2004 .
[38] Yoonmee Doh,et al. PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[39] Subhash Challa,et al. Survey of trust models in different network domains , 2010, ArXiv.
[40] Juliana Freire,et al. Provenance and scientific workflows: challenges and opportunities , 2008, SIGMOD Conference.
[41] Niki Pissinou,et al. Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[42] R-J. de Lange,et al. Provenance aware sensor networks for real-time data analysis , 2010 .
[43] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[44] Ling Liu,et al. A reputation-based trust model for peer-to-peer e-commerce communities , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[45] Elisa Bertino,et al. Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.
[46] Boon Thau Loo,et al. Provenance-aware secure networks , 2008, 2008 IEEE 24th International Conference on Data Engineering Workshop.
[47] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[48] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[49] Diego Gambetta. Can We Trust Trust , 2000 .
[50] Jochen Mundinger,et al. Reputation in self-organized communication systems and beyond , 2006 .
[51] Liudong Xing,et al. Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[52] Mani Srivastava,et al. Overview of sensor networks , 2004 .
[53] S. Buchegger,et al. Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[54] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[55] Matt Welsh,et al. Monitoring volcanic eruptions with a wireless sensor network , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[56] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[57] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[58] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[59] C Kajubi. On establishing trust. , 1999, The Mount Sinai journal of medicine, New York.
[60] Evangelos Kotsovinos,et al. BambooTrust: practical scalable trust management for global public computing , 2006, SAC.
[61] Prasant Mohapatra,et al. Evaluation of network trust using provenance based on distributed local intelligence , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[62] Julita Vassileva,et al. Bayesian network-based trust model , 2003, Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003).
[63] Mike Burmester,et al. Security Issues in Ad-Hoc Networks , 2008 .
[64] D. Collard,et al. Trust : making and breaking cooperative relations , 1989 .
[65] M. Welsh,et al. Vital Signs Monitoring and Patient Tracking Over a Wireless Network , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[66] Jean-Yves Le Boudec,et al. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[67] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[68] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[69] Hyunsoo Yoon,et al. Trust evaluation model for wireless sensor networks , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..
[70] Fred Busch,et al. Talking to strangers , 1981 .
[71] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[72] Steven D. Glaser,et al. Some real-world applications of wireless sensor nodes , 2004, SPIE Smart Structures and Materials + Nondestructive Evaluation and Health Monitoring.
[73] Zachary G. Ives,et al. ORCHESTRA: Rapid, Collaborative Sharing of Dynamic Data , 2005, CIDR.
[74] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[75] Edgar H. Callaway,et al. Wireless Sensor Networks: Architectures and Protocols , 2003 .
[76] Norman L. Chervany,et al. Conceptualizing trust: a typology and e-commerce customer relationships model , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[77] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[78] S. Challa,et al. RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[79] R. Govindan,et al. A PROGRAMMABLE WIRELESS SENSING SYSTEM FOR STRUCTURAL MONITORING , 2022 .
[80] Marianne Winslett,et al. Preventing history forgery with secure provenance , 2009, TOS.
[81] Jeremy J. Carroll,et al. Named graphs, provenance and trust , 2005, WWW '05.
[82] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[83] Warren E. Walker,et al. Defining Uncertainty: A Conceptual Basis for Uncertainty Management in Model-Based Decision Support , 2003 .
[84] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[85] Paul T. Groth,et al. The provenance of electronic data , 2008, CACM.
[86] Jennifer Widom,et al. Tracing the lineage of view data in a warehousing environment , 2000, TODS.
[87] Huafeng Wu,et al. Reputation-based Trust in Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[88] Panagiotis Papadimitratos,et al. Securing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.
[89] Johnson I. Agbinya,et al. A New Algorithm of Trust Formation in Wireless Sensor Networks , 2007 .
[90] Wang-Chien Lee,et al. Using sensorranks for in-network detection of faulty readings in wireless sensor networks , 2007, MobiDE '07.
[91] Sungyoung Lee,et al. Trust Management Problem in Distributed Wireless Sensor Networks , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).
[92] Daniele Quercia,et al. B-Trust: Bayesian Trust Framework for Pervasive Computing , 2006, iTrust.