메뉴 건너뛰기




Volumn 7, Issue 3, 2010, Pages 172-185

Trust management in mobile Ad Hoc networks using a scalable maturity-based model

Author keywords

ad hoc networks; security; Trust

Indexed keywords

COLLUDING ATTACK; ENERGY CONSUMPTION; EXCHANGE PROTOCOLS; FALSE RECOMMENDATION; LARGE NETWORKS; MALICIOUS NODES; MOBILE MULTIHOP NETWORKS; MOBILE SCENARIOS; RADIO RANGE; SECURITY; SINGLE-HOP NETWORK; TRUST; TRUST MANAGEMENT; TRUST MODELS; TRUST RELATIONSHIP;

EID: 77956353388     PISSN: 19324537     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNSM.2010.1009.I9P0339     Document Type: Review
Times cited : (154)

References (35)
  • 1
    • 0003582910 scopus 로고    scopus 로고
    • 1st edition. Addison-Wesley Professional
    • C. E. Perkins, Ad Hoc Networking, 1st edition. Addison-Wesley Professional, 2001.
    • (2001) Ad Hoc Networking
    • Perkins, C.E.1
  • 2
    • 34249811174 scopus 로고    scopus 로고
    • A survey of trust in computer science and the semantic web
    • June
    • D. Artz and Y. Gil, "A survey of trust in computer science and the semantic web", Web Semantics: Science, Services Agents World Wide Web, vol. 5, no. 2, pp. 58-71, June 2007.
    • (2007) Web Semantics: Science, Services Agents World Wide Web , vol.5 , Issue.2 , pp. 58-71
    • Artz, D.1    Gil, Y.2
  • 4
    • 0037253062 scopus 로고    scopus 로고
    • The vision of autonomic computing
    • Jan
    • J. O. Kephart and D. M. Chess, "The vision of autonomic computing", IEEE Computer, vol. 36, no. 1, pp. 41-52, Jan. 2003.
    • (2003) IEEE Computer , vol.36 , Issue.1 , pp. 41-52
    • Kephart, J.O.1    Chess, D.M.2
  • 7
    • 70349668623 scopus 로고    scopus 로고
    • An efficient filter-based addressing protocol for autoconfiguration of mobile ad hoc networks
    • Apr
    • N. C. Fernandes, M. D. D. Moreira, and O. C. M. B. Duarte, "An efficient filter-based addressing protocol for autoconfiguration of mobile ad hoc networks", in IEEE INFOCOM'09, Apr. 2009.
    • (2009) IEEE INFOCOM'09
    • Fernandes, N.C.1    Moreira, M.D.D.2    Duarte, O.C.M.B.3
  • 8
    • 24144473966 scopus 로고    scopus 로고
    • Topology and mobility considerations in mobile ad hoc networks
    • Nov
    • B. Ishibashi and R. Boutaba, "Topology and mobility considerations in mobile ad hoc networks", Ad Hoc Netw. J., vol. 3, no. 6, pp. 762-776, Nov. 2005.
    • (2005) Ad Hoc Netw. J. , vol.3 , Issue.6 , pp. 762-776
    • Ishibashi, B.1    Boutaba, R.2
  • 12
    • 43249085032 scopus 로고    scopus 로고
    • A programmable framework for the deployment of services and protocols in mobile ad hoc networks
    • Dec
    • A. Malatras, G. Pavlou, and S. Sivavakeesar, "A programmable framework for the deployment of services and protocols in mobile ad hoc networks", IEEE Trans. Netw. Service Management, vol. 4, no. 3, pp. 12-24, Dec. 2007.
    • (2007) IEEE Trans. Netw. Service Management , vol.4 , Issue.3 , pp. 12-24
    • Malatras, A.1    Pavlou, G.2    Sivavakeesar, S.3
  • 13
    • 46549089327 scopus 로고    scopus 로고
    • Evaluating voice traffic requirements on IEEE 802.11 ad hoc networks
    • June
    • P. B. Velloso, M. G. Rubinstein, and O. C. M. B. Duarte, Evaluating voice traffic requirements on IEEE 802.11 ad hoc networks", Annals Telecommun., vol. 63, no. 5-6, pp. 321-329, June 2008.
    • (2008) Annals Telecommun. , vol.63 , Issue.5-6 , pp. 321-329
    • Velloso, P.B.1    Rubinstein, M.G.2    Duarte, O.C.M.B.3
  • 16
    • 38749146509 scopus 로고    scopus 로고
    • Analysis of a reputation system for mobile ad-hoc networks with liars
    • no. 3-4
    • J. Mundinger and J.-Y. Le Boudec, "Analysis of a reputation system for mobile ad-hoc networks with liars", Performance Evaluation, vol. 65, no. 3-4, no. 3-4, pp. 212-226, 2008.
    • (2008) Performance Evaluation , vol.65 , Issue.3-4 , pp. 212-226
    • Mundinger, J.1    Le Boudec, J.-Y.2
  • 17
    • 29144503110 scopus 로고    scopus 로고
    • Attack-resistant cooperation stimulation in autonomous ad hoc networks
    • Dec
    • W. Yu and K. J. R. Liu, "Attack-resistant cooperation stimulation in autonomous ad hoc networks", IEEE J. Sel. Areas Commun., vol. 23, no. 12, pp. 2260-2271, Dec. 2005.
    • (2005) IEEE J. Sel. Areas Commun. , vol.23 , Issue.12 , pp. 2260-2271
    • Yu, W.1    Liu, K.J.R.2
  • 18
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • San Francisco, USA, Apr
    • S. Zhong, J. Chen, and Y. R. Yang, "Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks", in IEEE INFOCOM'03, San Francisco, USA, Apr. 2003.
    • (2003) IEEE INFOCOM'03
    • Zhong, S.1    Chen, J.2    Yang, Y.R.3
  • 19
    • 25844488399 scopus 로고    scopus 로고
    • Enforcing service availability in mobile ad-hoc wans
    • Aug
    • L. Buttyan and J. P. Hubaux, "Enforcing service availability in mobile ad-hoc wans", in IEEE/ACM MobiHoc'00, Aug. 2000.
    • (2000) IEEE/ACM MobiHoc'00
    • Buttyan, L.1    Hubaux, J.P.2
  • 20
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • Oct
    • L. Buttyan and J. P. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks", ACM/Kluwer Mobile Netw. Appl. (MONET), vol. 8, no. 5, pp. 579-592, Oct. 2003.
    • (2003) ACM/Kluwer Mobile Netw. Appl. (MONET) , vol.8 , Issue.5 , pp. 579-592
    • Buttyan, L.1    Hubaux, J.P.2
  • 21
    • 3042774583 scopus 로고    scopus 로고
    • Modelling incentives for collaboration in mobile ad hoc networks
    • Aug
    • J. Crowcroft, R. Gibbens, F. Kelly, and S. Östring, "Modelling incentives for collaboration in mobile ad hoc networks", Performance Evaluation, vol. 57, no. 4, pp. 427-439, Aug. 2004.
    • (2004) Performance Evaluation , vol.57 , Issue.4 , pp. 427-439
    • Crowcroft, J.1    Gibbens, R.2    Kelly, F.3    Östring, S.4
  • 22
    • 33751255669 scopus 로고    scopus 로고
    • Identity-based secure collaboration in wireless ad hoc networks
    • Feb
    • J. Pan, L. Cai, X. S. Shen, and J. W. Mark, "Identity-based secure collaboration in wireless ad hoc networks", Comput. Netw., vol. 51, no. 3, pp. 853-865, Feb. 2007.
    • (2007) Comput. Netw. , vol.51 , Issue.3 , pp. 853-865
    • Pan, J.1    Cai, L.2    Shen, X.S.3    Mark, J.W.4
  • 23
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Aug
    • S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks", in ACM MobiCom'00, Aug. 2000.
    • (2000) ACM MobiCom'00
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 24
    • 37549033550 scopus 로고    scopus 로고
    • Stimulating node cooperation in mobile ad hoc networks
    • Jan
    • J. N. Al-Karaki and A. E. Kamal, "Stimulating node cooperation in mobile ad hoc networks", Wireless Personal Commun., vol. 44, no. 2, pp. 219-239, Jan. 2008.
    • (2008) Wireless Personal Commun. , vol.44 , Issue.2 , pp. 219-239
    • Al-Karaki, J.N.1    Kamal, A.E.2
  • 26
    • 56749140937 scopus 로고    scopus 로고
    • Defense of trust management vulnerabilities in distributed networks
    • Feb
    • Y. L. Sun, Z. Han, and K. J. R. Liu, "Defense of trust management vulnerabilities in distributed networks", IEEE Commun. Mag., vol. 46, no. 2, pp. 112-119, Feb. 2008.
    • (2008) IEEE Commun. Mag. , vol.46 , Issue.2 , pp. 112-119
    • Sun, Y.L.1    Han, Z.2    Liu, K.J.R.3
  • 27
    • 33144465377 scopus 로고    scopus 로고
    • On trust models and trust evaluation metrics for ad hoc networks
    • Feb
    • G. Theodorakopoulos and J. S. Baras, "On trust models and trust evaluation metrics for ad hoc networks", IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 318-328, Feb. 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.2 , pp. 318-328
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 28
    • 39049116456 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • Barcelona, Spain, Apr
    • Y. Sun, Z. Han, W. Yu, and K. J. R. Liu, "A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks", in IEEE INFOCOM'06, Barcelona, Spain, Apr. 2006.
    • (2006) IEEE INFOCOM'06
    • Sun, Y.1    Han, Z.2    Yu, W.3    Liu, K.J.R.4
  • 29
    • 33646823968 scopus 로고    scopus 로고
    • A secure incentive architecture for ad hoc networks
    • May
    • Q. He, D. Wu, and P. Khosla, "A secure incentive architecture for ad hoc networks", Wireless Commun. Mobile Comput., vol. 6, no. 3, pp. 333-346, May 2006.
    • (2006) Wireless Commun. Mobile Comput. , vol.6 , Issue.3 , pp. 333-346
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 30
    • 42649129419 scopus 로고    scopus 로고
    • Future trust management framework for mobile ad hoc networks
    • J. Li, R. Li, and J. Kato, "Future trust management framework for mobile ad hoc networks", IEEE Commun. Mag., vol. 46, no. 4, pp. 108-114
    • IEEE Commun. Mag. , vol.46 , Issue.4 , pp. 108-114
    • Li, J.1    Li, R.2    Kato, J.3
  • 31
    • 24744448785 scopus 로고    scopus 로고
    • The effect of rumor spreading in reputation systems for mobile ad-hoc networks
    • Sophia-Antipolis, France, Mar
    • S. Buchegger and J.-Y. Le Boudec, "The effect of rumor spreading in reputation systems for mobile ad-hoc networks", in Modeling Optimization Mobile, Ad Hoc Wireless Netw., Sophia-Antipolis, France, Mar. 2003.
    • (2003) Modeling Optimization Mobile, Ad Hoc Wireless Netw.
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 32
    • 37549026497 scopus 로고    scopus 로고
    • Trust model for certificate revocation in ad hoc networks
    • May
    • S. Chinni, J. Thomas, G. Ghinea, and Z. Shen, "Trust model for certificate revocation in ad hoc networks", Ad Hoc Netw., vol. 6, no. 3, pp. 441-457, May 2008.
    • (2008) Ad Hoc Netw. , vol.6 , Issue.3 , pp. 441-457
    • Chinni, S.1    Thomas, J.2    Ghinea, G.3    Shen, Z.4
  • 35
    • 39449090815 scopus 로고    scopus 로고
    • A nature-inspired decentralized trust model to reduce information unreliability in complex disaster relief operations
    • Jan
    • D. Kostoulas, R. Aldunate, F. P. Mora, and S. Lakhera, "A nature-inspired decentralized trust model to reduce information unreliability in complex disaster relief operations", Adv. Eng. Informat., vol. 22, no. 1, pp. 45-58, Jan. 2008.
    • (2008) Adv. Eng. Informat. , vol.22 , Issue.1 , pp. 45-58
    • Kostoulas, D.1    Aldunate, R.2    Mora, F.P.3    Lakhera, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.