메뉴 건너뛰기




Volumn 5, Issue 3, 2010, Pages 283-291

An extended energy consumption analysis of reputation-based trust management schemes of wireless sensor networks

Author keywords

Reputation; Sensor networks; Trust evaluation; Trust management

Indexed keywords

COMPARATIVE ANALYSIS; ENERGY CONSUMPTION; ENERGY CONSUMPTION ANALYSIS; RESOURCE CONSTRAINT; SIMULATION-BASED; TRUST EVALUATION; TRUST MANAGEMENT;

EID: 78651546090     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.5.3.283-291     Document Type: Article
Times cited : (3)

References (23)
  • 3
    • 0002101577 scopus 로고    scopus 로고
    • Reputation systems: Facilitating trust in internet interactions
    • P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, "Reputation systems: Facilitating trust in internet interactions," Comm. of the ACM, vol. 43, no. 12, pp. 45-48, 2000.
    • (2000) Comm. of The Acm , vol.43 , Issue.12 , pp. 45-48
    • Resnick, P.1    Zeckhauser, R.2    Friedman, E.3    Kuwabara, K.4
  • 4
    • 33144465377 scopus 로고    scopus 로고
    • On trust models and trust evaluation metrics for ad hoc networks
    • Feb.
    • G. Theodorakopoulos and J. S. Baras, On trust models and trust evaluation metrics for ad hoc networks, IEEE J. on Selected Areas in Comm., vol. 24, no. 2, pp. 318-328, Feb. 2006.
    • (2006) IEEE J. On Selected Areas In Comm , vol.24 , Issue.2 , pp. 318-328
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 5
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Feb
    • Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, Information theoretic framework of trust modeling and evaluation for ad hoc networks, IEEE J. on Selected Areas in Comm., vol. 24, no. 2, pp. 305-317, Feb. 2006.
    • (2006) IEEE J. On Selected Areas In Comm , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.L.1    Yu, W.2    Han, Z.3    Liu, K.J.R.4
  • 6
    • 33745900048 scopus 로고    scopus 로고
    • A robust reputation system for peer-to-peer and mobile ad-hoc networks
    • Harvard University, Cambridge MA, USA, June
    • S. Buchegger and J.-Y. L. Boudec, "A robust reputation system for peer-to-peer and mobile ad-hoc networks," in Proc. of P2PEcon, Harvard University, Cambridge MA, USA, June 2004.
    • (2004) Proc. of P2pecon
    • Buchegger, S.1    Boudec J.-Y., L.2
  • 8
    • 24944562088 scopus 로고    scopus 로고
    • An evidence based architecture for efficient, attack-resistant computational trust dissemination in peer-to-peer networks
    • Paris: Springer-Verlag, May
    • D. Ingram, "An evidence based architecture for efficient, attack-resistant computational trust dissemination in peer-to-peer networks," in Proc. of 3rd Int. Conf. on Trust Management, ser. LNCS, vol. 3477. Paris: Springer-Verlag, May 2005, pp. 273-288.
    • (2005) Proc. of 3rd Int. Conf. On Trust Management, Ser. LNCS , vol.3477 , pp. 273-288
    • Ingram, D.1
  • 9
    • 3142738238 scopus 로고    scopus 로고
    • Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities
    • L. Xiong and L. Liu, Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities, IEEE Trans. on Knowledge and Data Engineering, vol. 16, no. 7, pp. 843-857, 2004.
    • (2004) IEEE Trans. On Knowledge and Data Engineering , vol.16 , Issue.7 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 11
    • 24744432675 scopus 로고    scopus 로고
    • Self-policing mobile ad hoc networks by reputation systems
    • July
    • S. Buchegger and J.-Y. L. Boudec, Self-policing mobile ad hoc networks by reputation systems, IEEE Comm. Magazine, vol. 43, no. 7, pp. 101-107, July 2005.
    • (2005) IEEE Comm. Magazine , vol.43 , Issue.7 , pp. 101-107
    • Buchegger, S.1    Boudec J.-Y., L.2
  • 13
    • 34548043694 scopus 로고    scopus 로고
    • Trust-based security for wireless ad hoc and sensor networks
    • Sept.
    • A. Boukerche, X. Li, and K. EL-Khatib, Trust-based security for wireless ad hoc and sensor networks, Computer Comm., vol. 30, pp. 2413-2427, Sept. 2007.
    • (2007) Computer Comm , vol.30 , pp. 2413-2427
    • Boukerche, A.1    Li, X.2    El-Khatib, K.3
  • 14
    • 39049103908 scopus 로고    scopus 로고
    • PLUS: Parameterized and localized trust management scheme for sensor networks security
    • Vancouver, Canada, Oct.
    • Z. Yao, D. Kim, and Y. Doh, "PLUS: Parameterized and localized trust management scheme for sensor networks security," in Proc. of the 3rd IEEE Int. Conf. on Mobile Adhoc and Sensor Systems, Vancouver, Canada, Oct. 2006, pp. 437-446.
    • (2006) Proc. of The 3rd IEEE Int. Conf. On Mobile Adhoc and Sensor Systems , pp. 437-446
    • Yao, Z.1    Kim, D.2    Doh, Y.3
  • 15
    • 44849093503 scopus 로고    scopus 로고
    • Reputation-based framework for high integrity sensor networks
    • S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," ACM Trans. Sen. Netw., vol. 4, no. 3, pp. 1-37, 2008.
    • (2008) Acm Trans. Sen. Netw , vol.4 , Issue.3 , pp. 1-37
    • Ganeriwal, S.1    Balzano, L.K.2    Srivastava, M.B.3
  • 16
    • 14344252208 scopus 로고    scopus 로고
    • Power efficient data gathering and aggregation in wireless sensor networks
    • Dec.
    • H. O. Tan and I. Korpeoglu, Power efficient data gathering and aggregation in wireless sensor networks, ACM SIGMOD Record, vol. 32, no. 4, pp. 66-71, Dec. 2003.
    • (2003) Acm Sigmod Record , vol.32 , Issue.4 , pp. 66-71
    • Tan, H.O.1    Korpeoglu, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.