메뉴 건너뛰기




Volumn 2, Issue , 2008, Pages 511-514

Trust models for sensor networks

Author keywords

Routing; Sensor networks; Trust model

Indexed keywords

AIRCRAFTS; CURRENT TRENDS; NETWORK COMMUNICATIONS; NETWORKING SERVICES; ROUTING; SECURITY ATTACKS; SECURITY THREATS; SENSOR APPLICATIONS; TRUST MANAGEMENT SYSTEMS; TRUST MANAGEMENTS; TRUST MODEL;

EID: 62849105443     PISSN: 13342630     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (11)
  • 2
    • 62849105815 scopus 로고    scopus 로고
    • P. Michiardi and R. Molva, CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad hoc Networks, in Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, 228. Kluwer Academic Publishers, 2002, pp. 107-121.
    • P. Michiardi and R. Molva, "CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad hoc Networks," in Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, vol. 228. Kluwer Academic Publishers, 2002, pp. 107-121.
  • 3
    • 33747431615 scopus 로고    scopus 로고
    • Asad Amir Pirzada Amitava Dattaa and Chris McDonald, Incorporating trust and reputation in the DSR protocol for dependable routing Computer Communications 29, Issue 15, 5 September 2006, pp. 2806-2821
    • Asad Amir Pirzada Amitava Dattaa and Chris McDonald, "Incorporating trust and reputation in the DSR protocol for dependable routing" Computer Communications Volume 29, Issue 15, 5 September 2006, pp. 2806-2821
  • 6
    • 62849115022 scopus 로고    scopus 로고
    • Asad Amir Pirzada and Chris McDonald Trusted Greedy Perimeter Stateless Routing, IEEE, ICON2007
    • Asad Amir Pirzada and Chris McDonald "Trusted Greedy Perimeter Stateless Routing", IEEE, ICON2007
  • 8
    • 0036738266 scopus 로고    scopus 로고
    • Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victorwen And David E. Culler SPINS: Security Protocols for Sensor Networks ACM Journal of Wireless Networks, 8:5, September 2002, pp. 521-534
    • Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victorwen And David E. Culler "SPINS: Security Protocols for Sensor Networks" ACM Journal of Wireless Networks, 8:5, September 2002, pp. 521-534
  • 10
    • 85177182282 scopus 로고    scopus 로고
    • Y.C. Hu, A. Perrig, and D.B. Johnson, Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Proc. Eighth Ann. Int'l Conf. Mobile Computing and Networking (MobiCom), pp. 12-23.
    • Y.C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proc. Eighth Ann. Int'l Conf. Mobile Computing and Networking (MobiCom), pp. 12-23.
  • 11
    • 36348973964 scopus 로고    scopus 로고
    • Cluster-based Reputation and Trust for Wireless Sensor Networks
    • CCNC 2007Las Vegas, NV, USA, Jan
    • Garth V. Crosby and Niki Pissinou, "Cluster-based Reputation and Trust for Wireless Sensor Networks" Consumer Communications and Networking Conference, 2007. CCNC 2007Las Vegas, NV, USA, Jan. 2007
    • (2007) Consumer Communications and Networking Conference
    • Crosby, G.V.1    Pissinou, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.