메뉴 건너뛰기




Volumn 30, Issue 11-12, 2007, Pages 2413-2427

Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Comput. Commun. 30 (2007) 2413-2427] (DOI:10.1016/j.comcom.2007.04.022);Trust-based security for wireless ad hoc and sensor networks

Author keywords

Delay; Mobile agent; Overhead; Reputation; Trust; Wireless sensor networks

Indexed keywords

AD HOC NETWORKS; COMPUTER CRIME; MOBILE AGENTS; SECURITY OF DATA;

EID: 34548043694     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2007.09.014     Document Type: Erratum
Times cited : (259)

References (45)
  • 1
    • 84994155710 scopus 로고    scopus 로고
    • A. Abdul-Rahman, S. Hailes, A distributed trust model, in: Proc. 1997 Workshop on New Security Paradigms, Langdale, UK, 1997, pp. 48-60.
  • 2
    • 85094162508 scopus 로고    scopus 로고
    • A. Abdul-Rahman, S. Hailes, Supporting trust in virtual communities, in: Proc. 33rd Ann. Hawaii Int'l Conf. Syst. Sci. (HICSS 33), vol. 6, (2000) pp. 6007-6016.
  • 3
    • 34548045098 scopus 로고    scopus 로고
    • B. Alunkal, I. Veljkovic, G.V. Laszewski, K. Aminand, Reputation-based grid resource selection, in: Proc. Workshop Adaptive Grid Middleware, New Orleans, US, Sep. 2003. Available from (reputation.pdf on May 06, 2005).
  • 4
    • 84887937075 scopus 로고    scopus 로고
    • F. Azzedin, M. Maheswaran. Towards trust-aware resource management in grid computing systems, in: Proc. Second IEEE/ACM Int'l. Symp. Cluster Comput. Grid (CCGRID'02), Berlin, Germany, May 2002, pp. 452-457.
  • 5
    • 0035009259 scopus 로고    scopus 로고
    • S. Banerjee, S. Khuller. A clustering scheme for hierarchical control in multi-hop wireless networks, in: IEEE Infocom 2001, Anchorage, US, Apr. 2001, pp. 1028-1037.
  • 6
    • 0033366376 scopus 로고    scopus 로고
    • S. Basagni. Distributed clustering for ad hoc networks, in: Proc. 1999 Int'l. Symp. Parallel Arch., Alg. Netw. (ISPAN '99), Fremantle, Australia, June 1999, pp. 310-315.
  • 7
    • 34548024437 scopus 로고    scopus 로고
    • M. Blaze, J. Feigenbaum, J. Ioannidis, A.D. Keromytis, RFC 2704 - The KeyNote Trust Management System Version 2, Sep. 1999. Available from (on May 06, 2005).
  • 8
    • 0029700344 scopus 로고    scopus 로고
    • M. Blaze, J. Feigenbaum, J. Lacy. Decentralized Trust Management, in: Proceedings of 1996 IEEE Conference on Privacy and Security, Oakland, US, 1996, pp. 164-173.
  • 9
    • 34548017067 scopus 로고    scopus 로고
    • S. Buchegger, J. Boudec, A robust reputation system for P2P and mobile ad-hoc networks, in: Proc. Second Workshop the Economics of Peer-to-Peer Systems, Cambridge, US, June 2004. (Available from (on May 06, 2005).
  • 10
    • 34548044278 scopus 로고    scopus 로고
    • S. Buchegger, J.L. Boudec, Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, in: Proc. Tenth Euromicro Workshop Parallel, Distr. Netw.-based Process., 2002, pp. 403-410.
  • 11
    • 0029515447 scopus 로고    scopus 로고
    • N. Budhiraja, K. Marzullo, Tradeoffs in implementing primary-backup protocols, in: Proc. Seventh IEEE Symp. Parallel Distr. Process., San Antonio, US, Oct. 1995, pp. 280-288.
  • 12
    • 34548042584 scopus 로고    scopus 로고
    • B. Christianson, W.S. Harbison, Why isn't trust transitive?, in: Proc. Security Protocols Int'l Workshop, University of Cambridge, 1996, pp. 171-176.
  • 13
    • 33646826825 scopus 로고    scopus 로고
    • P. Dewan, P. Dasgupta, Securing P2P networks using peer reputations: is there a silver bullet?, in: Proc. IEEE consumer communications and networking conference (CCNC 2005), Las Vegas, US, 2005. Available from (on May 06, 2005).
  • 14
    • 34548040731 scopus 로고    scopus 로고
    • D. Gambetta. Can We Trust Trust?, in :D. Gambetta, (Ed.), Trust: Making and Breaking Cooperative Relations, Department of Sociology, University of Oxford, Electronic Edition, 1990 (pp. 213-237) (Chapter13).
  • 15
    • 3142719292 scopus 로고
    • Multicluster, mobile, multimedia radio network
    • Gerla M., and Tsai J.T. Multicluster, mobile, multimedia radio network. ACM-Baltzer J. Wirel. Netw. 1 3 (1995) 255-265
    • (1995) ACM-Baltzer J. Wirel. Netw. , vol.1 , Issue.3 , pp. 255-265
    • Gerla, M.1    Tsai, J.T.2
  • 16
    • 34548008195 scopus 로고    scopus 로고
    • V.S. Grishchenko, A fuzzy model for context-dependent reputation, in: Proceedings of Trust, Security and Reputation Workshop at ISWC 2004, Hiroshima, Japan, 2004. Available from (s.pdf on May 06, 2005).
  • 17
    • 0038717615 scopus 로고    scopus 로고
    • M. Gupta, P. Judge, M. Ammar, A Reputation System for Peer-to-peer networks, in: Proc. 13th Int'l Workshop Netw. Oper. Syst. Support for Digital Audio and Video, Monterey, US, June 2003, pp. 144-152.
  • 19
    • 4544283175 scopus 로고    scopus 로고
    • Q. He, O.D. Wu, P. Khosla, SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks, in: Proceedings of IEEE Wireless Communications and Networking Conference 2004. Available from (on May 06, 2005).
  • 20
    • 0033724294 scopus 로고    scopus 로고
    • A. Herzberg, Y. Mass, J. Michaeli, D. Naor, Y. Ravid, Access control meets public key infrastructure, or: assigning roles to strangers, in: Proc. 2000 IEEE Symp. Security and Privacy, Berkeley, US, May 2000, pp. 2-14.
  • 21
    • 34548031653 scopus 로고    scopus 로고
    • R. Housley, W. Polk, W. Ford, D. Solo, RFC 3280, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Apr. 2002. (Available at (on May 06, 2005).
  • 22
    • 84944035346 scopus 로고    scopus 로고
    • R. Jurca, B. Faltings. An incentive compatible reputation mechanism, in: Proc. IEEE Int'l Conf. E-Commerce, June 2003.
  • 23
    • 84880467894 scopus 로고    scopus 로고
    • S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina. The Eigentrust algorithm for reputation management in P2P networks, in: Proc. 12th Int'l World Wide Web Conf., Budapest, Hungary, 2003, pp. 640-651.
  • 24
    • 62349090353 scopus 로고    scopus 로고
    • N. Li, J. Mitchell, RT, A Role-based Trust-management Framework, in: Proc. Third DARPA Inform. Surviv. Conf. Exposition (DISCEX'03), Apr. 2003, pp. 201-212.
  • 25
    • 0031234161 scopus 로고    scopus 로고
    • Adaptive clustering for mobile networks
    • Lin C.R., and Gerla M. Adaptive clustering for mobile networks. IEEE J. Select. Areas Commun. 15 7 (1997) 1265-1275
    • (1997) IEEE J. Select. Areas Commun. , vol.15 , Issue.7 , pp. 1265-1275
    • Lin, C.R.1    Gerla, M.2
  • 26
    • 33847008265 scopus 로고    scopus 로고
    • J. Liu, V. Issarny, Enhanced reputation mechanism for mobile ad hoc networks, in: Proceedings of the Second International Conference on Trust Management, vol. 2995, Mar. 2004, pp. 48-62.
  • 27
    • 5044222209 scopus 로고    scopus 로고
    • Z. Liu, A.W. Joy, R.A. Thompson, A dynamic trust model for mobile ad hoc networks, in: Proc. Tenth IEEE Int'l Workshop Future Trends Distr. Comput. Syst. (FTDCS'04), Suzhou, China, May 2004, pp. 80-85.
  • 28
    • 34548032394 scopus 로고    scopus 로고
    • D.H. McKnight, N.L. Chervany, The Meanings of Trust Technical Report 94-04, Carlson School of Management, University of Minnesota, 1996.
  • 29
    • 34548009637 scopus 로고    scopus 로고
    • P. Michiardi, R. Molva, Core: A collaborative reputation mechanism to enforce node cooperation in mobile AD HOC networks, in: Proc. Sixth IFIP Commun. Multimedia Secur. Conf., Portorosz, Slovenia, 2002, pp. 107-121.
  • 31
    • 84948698587 scopus 로고    scopus 로고
    • L. Mui, M. Mohtashemi, A. Halberstadt, A computational model of trust and reputation, in: Proc. 35th Hawaii Int'l Conf. Syst. Sci., 2002, pp. 188-196.
  • 32
    • 4544265421 scopus 로고    scopus 로고
    • T.G. Papaioannou, G.D. Stamoulis, Effective use of reputation of peer-to-peer environments, in: Proceedings of IEEE/ACM CCGRID 2004, GP2PC workshop, Chicago, U.S., Apr. 2004. (Available from (on May 06, 2005).
  • 33
    • 34548029200 scopus 로고    scopus 로고
    • A.A. Pirzada, C. McDonald, Establishing trust in pure ad-hoc networks, in: Proc. 27th Conf. Australasian Computer Sci., ACM Int'l Conf. Proc. Series, Dunedin, New Zealand, 2004, pp. 47-54.
  • 34
    • 0034546215 scopus 로고    scopus 로고
    • S. Pleisch, A. Schiper, Modeling fault-tolerant mobile agent execution as a sequence of agreement problems, in: Proc. 19th IEEE Symp. Reliable Distr. Syst., Nuremberg, Germany, Oct. 2000, pp. 11-20.
  • 35
    • 3142569233 scopus 로고    scopus 로고
    • K. Ren, T. Li, Z. Wan, F. Bao, R.H. Deng, K. Kim, Highly reliable trust establishment scheme in ad hoc networks, Eslevier J. Comput. Netw., Apr. 2004, pp. 687-699.
  • 36
    • 0032305994 scopus 로고    scopus 로고
    • K. Rothermel, M. straber, A fault-tolerant protocol for providing the exactly-once property of mobile agents, in: Proc. 17th IEEE Symp. Reliable Distr. Syst., 1998, pp. 100-108.
  • 37
    • 34548037007 scopus 로고    scopus 로고
    • T. Sander, C. Tschudin, Protecting mobile agents against malicious hosts, in: Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, Heidelberg, Germany, 1998. pp. 44-60.
  • 38
    • 33846619550 scopus 로고    scopus 로고
    • F.B. Schneider, Towards fault-tolerant and secure agentry, in: Proc. 11th Int'l Workshop on Distributed Algorithms, Saarbrucken, Germany, Sep. 1997, pp. 1-14.
  • 39
    • 33646022178 scopus 로고    scopus 로고
    • D. Scott, A. Beresford, A. Mycroft, Spatial security policies for mobile agents in a sentient computing environment, in: Proceedings of FASE 2003, Lecture Notes in Computer Science, vol. 2621, Warsaw, Poland, Apr. 2003, pp. 102-117.
  • 40
    • 0034833404 scopus 로고    scopus 로고
    • Y. Tahara, A. Ohsuga, S. Honiden, Mobile agent security with the IPEditor development tool and the mobile UNITY language, in: Proc. Fifth Int'l Conf. Autonomous Agents, Montreal, Canada, 2001, pp. 656-662.
  • 41
    • 0029733838 scopus 로고    scopus 로고
    • J. Tardo, L. Valente, Mobile agent security and telescript. n Proceedings of the 41st Int'l Conf. IEEE Comput. Soci. (CompCon '96), pages 58-63, Feb. 1996.
  • 42
    • 11244333253 scopus 로고    scopus 로고
    • G. Theodorakopoulos, J.S. Baras. Trust evaluation in ad-hoc networks, in: Proc. 2004 ACM Workshop on Wirel. Security, Philadelphia, U.S., 2004, pp. 1-10.
  • 43
    • 84943784070 scopus 로고    scopus 로고
    • Y. Wang, J. Vassileva, Trust and reputation model in peer-to-peer networks, in: Proc. Third Int'l Conf. Peer-to-Peer Comput. (P2P'03), Linkoping, Sweden, Sep. 2003, pp. 150-157.
  • 44
    • 0037505405 scopus 로고    scopus 로고
    • Landmark routing in ad hoc networks with mobile backbones
    • Xu K., Hong X., and Gerla M. Landmark routing in ad hoc networks with mobile backbones. J. Parallel Distri. Comput. 63 2 (2003) 110-122
    • (2003) J. Parallel Distri. Comput. , vol.63 , Issue.2 , pp. 110-122
    • Xu, K.1    Hong, X.2    Gerla, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.