메뉴 건너뛰기




Volumn , Issue , 2009, Pages

A trust management scheme for enhancing security in pervasive wireless networks

Author keywords

Pervasive computing; Probabilistic trust; Wireless networks, security

Indexed keywords

MALICIOUS NODES; PACKET LOSS RATIO; PERFORMANCE METRICES; PERVASIVE COMPUTING; SIMULATION EXPERIMENTS; TIME PERIODS; TRUST MANAGEMENT;

EID: 77951542715     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2009.5425782     Document Type: Conference Paper
Times cited : (6)

References (16)
  • 1
    • 0037341461 scopus 로고    scopus 로고
    • st century
    • IEEE Computer Society Press
    • st century," In IEEE Computer, IEEE Computer Society Press, pp. 25-31, 2003.
    • (2003) IEEE Computer , pp. 25-31
    • Saha, D.1    Mukherjee, A.2
  • 2
  • 5
    • 56949106800 scopus 로고    scopus 로고
    • A trust-based system for ubiquitous and pervasive computing environments
    • A. Boukerche, Y. Ren, "A trust-based system for ubiquitous and pervasive computing environments," In Computer Communications, 31 (2008), pp. 4343-4351.
    • (2008) Computer Communications , vol.31 , pp. 4343-4351
    • Boukerche, A.1    Ren, Y.2
  • 13
    • 0035577649 scopus 로고    scopus 로고
    • Trust-based security in pervasive computing environments
    • L. Kagal, T. Finin, and A. Joshi, "Trust-based security in pervasive computing environments," IEEE Computer, vol. 34, issue 12, pp. 154-157, 2001.
    • (2001) IEEE Computer , vol.34 , Issue.12 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 14
    • 50249155285 scopus 로고    scopus 로고
    • A trust model for pervasive computing environments
    • S. Yin, I. Ray, I. Ray, "A trust model for pervasive computing environments," Proc, of CollaborateCom2006, pp. 1-6, 2006.
    • (2006) Proc, of CollaborateCom2006 , pp. 1-6
    • Yin, S.1    Ray, I.2    Ray, I.3
  • 16
    • 39049116456 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • Y. L. Sun, Z. Han, W. Yu, K. J. R. Liu, "A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks," In Proc. of INFOCOM 2006, pp. 1-13, 2006
    • (2006) Proc. of INFOCOM 2006 , pp. 1-13
    • Sun, Y.L.1    Han, Z.2    Yu, W.3    Liu, K.J.R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.