메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 641-650

Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

COGNITIVE NETWORK; DESIGN PARAMETERS; GROUP COMMUNICATION SYSTEMS; HIERARCHICAL MODELING; MOBILE NODES; MODELING AND ANALYSIS; NETWORK ENVIRONMENTS; SOCIAL NETWORKS; STOCHASTIC PETRI NETS; TRUST LEVEL; TRUST MANAGEMENT; TRUST METRICS;

EID: 70749147824     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSE.2009.68     Document Type: Conference Paper
Times cited : (52)

References (24)
  • 1
    • 33745456457 scopus 로고    scopus 로고
    • Toward a decentralized trust-based access control system for dynamic collaboration
    • 15-17 June, West Point, NY
    • W. J. Adams, N. J. Davis, "Toward a Decentralized Trust-based Access Control System for Dynamic Collaboration," Proc. 6th Annual IEEE SMC Information Assurance Workshop (IAW'05), 15-17 June, 2005, West Point, NY, pp. 317-324.
    • (2005) Proc. 6th Annual IEEE SMC Information Assurance Workshop (IAW'05) , pp. 317-324
    • Adams, W.J.1    Davis, N.J.2
  • 3
    • 84860703392 scopus 로고    scopus 로고
    • Cluster-based intrusion detection (CBID) architecture for mobile ad hoc networks
    • Gold Coast, Australia, 21-26 May
    • E. Ahmed, K. Samad and W. Mahmood, "Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks." AusCERT Asia Pacific Information Technology Security Conf., Gold Coast, Australia, 21-26 May 2006.
    • (2006) AusCERT Asia Pacific Information Technology Security Conf.
    • Ahmed, E.1    Samad, K.2    Mahmood, W.3
  • 5
    • 14344264010 scopus 로고    scopus 로고
    • Cooperative games, phase transition on graphs and distributed trust in MANETs
    • Atlantis, Bahamas, 14-17 Dec.
    • J. S. Baras and T. Jiang, "Cooperative Games, Phase Transition on Graphs and Distributed Trust in MANETs," Proc. 43th IEEE Conf. on Decision and Control (CDC'04), Atlantis, Bahamas, 14-17 Dec. 2004, vol. 1, pp. 93-98.
    • (2004) Proc. 43th IEEE Conf. on Decision and Control (CDC'04) , vol.1 , pp. 93-98
    • Baras, J.S.1    Jiang, T.2
  • 7
    • 63449141260 scopus 로고    scopus 로고
    • A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks
    • Vancouver, British Columbia, Canada
    • A. Boukerche and Y. Ren, "A Security Management Scheme using a Novel Computational Reputation Model for Wireless and Mobile Ad Hoc Networks," Proc. Int'l Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, Vancouver, British Columbia, Canada, pp. 88-95, 2008
    • (2008) Proc. Int'l Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems , pp. 88-95
    • Boukerche, A.1    Ren, Y.2
  • 8
    • 0242678584 scopus 로고    scopus 로고
    • Self-Organized public-key management for mobile ad hoc networks
    • Jan.-Mar.
    • S. Capkun, L. Buttyan, and J. -P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Transactions on Mobile Computing, vol. 2, no. 1, Jan.-Mar. 2003, pp. 52-64.
    • (2003) IEEE Transactions on Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.-P.3
  • 9
    • 70749134483 scopus 로고    scopus 로고
    • Toward a human trust model for mobile ad-hoc networks
    • 5-7 May Cambridge University, Cambridge, UK.
    • L. Capra, "Toward a Human Trust Model for Mobile Ad-hoc Networks," Proc. 2nd UK-UbiNet Workshop, 5-7 May 2004, Cambridge University, Cambridge, UK.
    • (2004) Proc. 2nd UK-UbiNet Workshop
    • Capra, L.1
  • 10
    • 79957699559 scopus 로고    scopus 로고
    • Towards trust-based cognitive networks: A survey of trust management for mobile ad hoc networks
    • Washington D.C. 15-17 June
    • J. H. Cho and A. Swami, "Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks," 14th Int'l Command and Control Research and Technology Symposium, Washington D.C. 15-17 June 2009.
    • (2009) 14th Int'l Command and Control Research and Technology Symposium
    • Cho, J.H.1    Swami, A.2
  • 11
    • 0003247337 scopus 로고    scopus 로고
    • Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations
    • Jan.
    • S. Corson and J. Macker, "Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations," RFC 2501, Jan. 1999.
    • (1999) RFC 2501
    • Corson, S.1    Macker, J.2
  • 12
    • 0003552195 scopus 로고    scopus 로고
    • K. S. Cook (editor), Feb. Russell Sage Foundation Series on Trust, New York.
    • K. S. Cook (editor), Trust in Society, vol. 2, Feb. 2003, Russell Sage Foundation Series on Trust, New York.
    • (2003) Trust in Society , vol.2
  • 13
    • 29844453185 scopus 로고    scopus 로고
    • Towards designing a trust routing solution in mobile ad hoc networks
    • T. Ghosh, N. Pissinou, and K. Makki, "Towards Designing a Trust Routing Solution in Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 10, pp. 985-995, 2005.
    • (2005) Mobile Networks and Applications , vol.10 , pp. 985-995
    • Ghosh, T.1    Pissinou, N.2    Makki, K.3
  • 15
    • 33947387917 scopus 로고    scopus 로고
    • Trust management in distributed systems
    • Feb.
    • H. Li and M. Singhal, "Trust Management in Distributed Systems," Computer, vol. 40, no. 2, Feb. 2007, pp. 45-53.
    • (2007) Computer , vol.40 , Issue.2 , pp. 45-53
    • Li, H.1    Singhal, M.2
  • 16
    • 42649129419 scopus 로고    scopus 로고
    • Future trust management framework for mobile ad hoc networks: Security in mobile ad hoc
    • Apr.
    • J. Li, R. Li, and J. Kato, "Future Trust Management Framework for Mobile Ad Hoc Networks: Security in Mobile Ad Hoc," IEEE Communications Magazine, vol. 46, no. 4, Apr. 2008, pp. 108-114.
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 108-114
    • Li, J.1    Li, R.2    Kato, J.3
  • 18
    • 11244320485 scopus 로고    scopus 로고
    • URSA: Ubiquitous and robust access control for mobile ad hoc networks
    • Dec.
    • H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks," IEEE/ACM Transactions on Networking (TON), vol. 12, no. 6, Dec. 2004, pp. 1049-1063.
    • (2004) IEEE/ACM Transactions on Networking (TON) , vol.12 , Issue.6 , pp. 1049-1063
    • Luo, H.1    Kong, J.2    Zerfos, P.3    Lu, S.4    Zhang, L.5
  • 19
    • 38749146509 scopus 로고    scopus 로고
    • Analysis of a reputation system for mobile ad hoc networks with liars
    • Mar.
    • J. Mundinger and J. Le Boudec, "Analysis of a Reputation System for Mobile Ad Hoc Networks with Liars," Performance Evaluation, vol. 65, no. 3-4, pp. 212-226, Mar. 2008.
    • (2008) Performance Evaluation , vol.65 , Issue.3-4 , pp. 212-226
    • Mundinger, J.1    Boudec, J.L.2
  • 22
    • 33144484173 scopus 로고    scopus 로고
    • Special issue on security in wireless ad hoc networks
    • F. Anjum, A. K. Ghosh, N. Golmie, P. Kolodzy, R. Poovendran, R. Shorey, and D. Lee, Guest Editors, Feb.
    • F. Anjum, A. K. Ghosh, N. Golmie, P. Kolodzy, R. Poovendran, R. Shorey, and D. Lee, Guest Editors, "Special Issue on Security in Wireless Ad Hoc Networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, Feb. 2006, pp. 217-220.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 217-220
  • 23
    • 33846911348 scopus 로고    scopus 로고
    • Cognitive networks: Adaptation and learning to achieve end-to-End performance objectives
    • Topics in Radio Communications, Dec.
    • R. W. Thomas, D. H. Friend, L. A. DaSilva, and A.B. MacKenzie, "Cognitive Networks: Adaptation and Learning to Achieve End-to-End Performance Objectives," IEEE Communications Magazine, Topics in Radio Communications, Dec. 2006, pp. 51-57.
    • (2006) IEEE Communications Magazine , pp. 51-57
    • Thomas, R.W.1    Friend, D.H.2    DaSilva, L.A.3    MacKenzie, A.B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.