메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1000-1005

A trust evaluation method for node cooperation in mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

NODE COOPERATION; TRUST EVALUATION METHOD;

EID: 44049090146     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITNG.2008.43     Document Type: Conference Paper
Times cited : (19)

References (21)
  • 1
    • 38549125449 scopus 로고    scopus 로고
    • A Trust Approach for Node Cooperation in MANET
    • 3rd International Conference on Mobile Ad-hoc and Sensor Network
    • W. Kun, and W. Meng, "A Trust Approach for Node Cooperation in MANET," 3rd International Conference on Mobile Ad-hoc and Sensor Network, LNCS 4864, pp. 481-491, 2007.
    • (2007) LNCS , vol.4864 , pp. 481-491
    • Kun, W.1    Meng, W.2
  • 2
    • 0037230515 scopus 로고    scopus 로고
    • Ad Hoc networking in future wireless communications
    • [2]R. David, and G.N Ignas, "Ad Hoc networking in future wireless communications," Computer Communications, Vol. 26, 2003, pp.36-40.
    • (2003) Computer Communications , vol.26 , pp. 36-40
    • David, R.1    Ignas, G.N.2
  • 7
    • 85113133621 scopus 로고    scopus 로고
    • Core: A COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks
    • P. Michiardi, and R. Molva, "Core: A COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks," IFIP - Communication and Multimedia Security Conference, pp.107-121, 2002.
    • (2002) IFIP - Communication and Multimedia Security Conference , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 8
    • 0004118144 scopus 로고    scopus 로고
    • Nuglets: A virtual currency to stimulate cooperation in self-organized MANET networks,
    • Technical Report DSC/2001/001, Swiss Federal Institute of Technology, Lausanne
    • L. Buttyan, and J.P. Hubaux, "Nuglets: a virtual currency to stimulate cooperation in self-organized MANET networks," Technical Report DSC/2001/001, Swiss Federal Institute of Technology, Lausanne, 2001.
    • (2001)
    • Buttyan, L.1    Hubaux, J.P.2
  • 10
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • San Francisco, CA
    • S. Zhong, J Chen., and Y.R. Yan, "Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks," IEEE Conference on Computer Communications, San Francisco, CA, 2003. pp.1987-1997.
    • (2003) IEEE Conference on Computer Communications , pp. 1987-1997
    • Zhong, S.1    Chen, J.2    Yan, Y.R.3
  • 11
  • 17
    • 85084162792 scopus 로고    scopus 로고
    • Attack-resistant trust metrics for public key certification
    • San Antonio, TX
    • R. Levien, and A. Aiken, "Attack-resistant trust metrics for public key certification," 7th USENIX Security Symposium, San Antonio, TX, 1998, pp 229-242.
    • (1998) 7th USENIX Security Symposium , pp. 229-242
    • Levien, R.1    Aiken, A.2
  • 19
    • 11144261348 scopus 로고    scopus 로고
    • Computational models of trust and reputation: Agents, evolutionary game, and social networks,
    • Ph.D Thesis, MIT, Massachusetts
    • L. Mui, "Computational models of trust and reputation: agents, evolutionary game, and social networks," Ph.D Thesis, MIT, Massachusetts, 2003.
    • (2003)
    • Mui, L.1
  • 20
  • 21
    • 24744432675 scopus 로고    scopus 로고
    • Self-policing Mobile Ad Hoc Networks by Reputation Systems
    • S. Buchegger, and J.Y. Le Boudec, "Self-policing Mobile Ad Hoc Networks by Reputation Systems," IEEE Communications, 2005, pp. 101-107.
    • (2005) IEEE Communications , pp. 101-107
    • Buchegger, S.1    Le Boudec, J.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.