메뉴 건너뛰기




Volumn 13, Issue 4, 2011, Pages 562-583

A survey on trust management for mobile ad hoc networks

Author keywords

cognitive networks; mobile ad hoc networks; social networks; trust; Trust management; trust metrics

Indexed keywords

COGNITIVE NETWORK; SOCIAL NETWORKS; TRUST; TRUST MANAGEMENT; TRUST METRICS;

EID: 84857844113     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2011.092110.00088     Document Type: Review
Times cited : (555)

References (125)
  • 1
    • 0003247337 scopus 로고    scopus 로고
    • Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations
    • Jan.
    • S. Corson and J. Macker, "Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations," RFC 2501, Jan. 1999.
    • (1999) RFC , vol.2501
    • Corson, S.1    Macker, J.2
  • 2
    • 0023139974 scopus 로고
    • The DARPA packet radio network protocols
    • Jan.
    • J. Jubin and J. Tornow, "The DARPA Packet Radio Network Protocols," Proc. IEEE, vol. 75, no. 1, Jan. 1987, pp. 21-32.
    • (1987) Proc. IEEE , vol.75 , Issue.1 , pp. 21-32
    • Jubin, J.1    Tornow, J.2
  • 3
    • 84857818590 scopus 로고    scopus 로고
    • ARL advanced telecommunication and information distribution research program (ATIRP)
    • June 2001
    • A. J. Tardiff and J.W. Gowens, Editors, "ARL Advanced Telecommunication and Information Distribution Research Program (ATIRP)," Final Report, 1996-2001, June 2001.
    • (1996) Final Report
    • Tardiff, A.J.1    Gowens, J.W.2
  • 5
    • 0003552195 scopus 로고    scopus 로고
    • Feb., Russell Sage Foundation Series on Trust, New York
    • K. S. Cook (editor), Trust in Society, vol. 2, Feb. 2003, Russell Sage Foundation Series on Trust, New York.
    • (2003) Trust in Society , vol.2
    • Cook, K.S.1
  • 7
    • 0842289235 scopus 로고    scopus 로고
    • Bootstrapping security associations for routing in mobile ad hoc networks
    • San Francisco, CA, Dec.
    • R. B. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh, "Bootstrapping Security Associations for Routing in Mobile Ad Hoc Networks," Proc. IEEE GLOBECOM, San Francisco, CA, Dec. 2003, pp.1511-1515.
    • (2003) Proc. IEEE GLOBECOM , pp. 1511-1515
    • Bobba, R.B.1    Eschenauer, L.2    Gligor, V.3    Arbaugh, W.4
  • 10
    • 24944461245 scopus 로고    scopus 로고
    • Trust management survey
    • P. Herrmann et al. (Eds.), Lecture Notes in Computer Science
    • S. Ruhomaa and L. Kutvonen, "Trust Management Survey," P. Herrmann et al. (Eds.), iTrust 2005, Lecture Notes in Computer Science, vol. 3477, pp. 77-92.
    • (2005) ITrust , vol.3477 , pp. 77-92
    • Ruhomaa, S.1    Kutvonen, L.2
  • 12
    • 0009481412 scopus 로고    scopus 로고
    • A survey of trust in internet applications
    • T. Grandison and M. Sloman, "A Survey of Trust in Internet Applications," IEEE Commun. Surveys and Tutorials, vol. 3, no. 4, pp. 2-16, 2000.
    • (2000) IEEE Commun. Surveys and Tutorials , vol.3 , Issue.4 , pp. 2-16
    • Grandison, T.1    Sloman, M.2
  • 13
    • 79957699559 scopus 로고    scopus 로고
    • Towards trust-based cognitive networks: A survey of trust management for mobile ad hoc networks
    • Washington D.C. 15-17 June
    • J. H. Cho and A. Swami, "Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks," 14th Int'l Command and Control Research and Technology Symposium, Washington D.C. 15-17 June 2009.
    • (2009) 14th Int'l Command and Control Research and Technology Symposium
    • Cho, J.H.1    Swami, A.2
  • 14
    • 84857859118 scopus 로고    scopus 로고
    • Merriam Webster's Dictionary [Online]
    • Merriam Webster's Dictionary [Online]: http://www.merriamwebster.com/ dictionary/trust%5B1%5D.
  • 17
    • 33745456457 scopus 로고    scopus 로고
    • Toward a decentralized trust-based access control system for dynamic collaboration
    • 15-17 June, West Point, NY
    • W. J. Adams, N. J. Davis, "Toward a Decentralized Trust-based Access Control System for Dynamic Collaboration," Proc. 6th Annual IEEE SMC Information Assurance Workshop, 15-17 June, 2005, West Point, NY, pp. 317-324.
    • (2005) Proc. 6th Annual IEEE SMC Information Assurance Workshop , pp. 317-324
    • Adams, W.J.1    Davis, N.J.2
  • 19
    • 0036200608 scopus 로고    scopus 로고
    • The trust paradox: A survey of economic inquiries into the nature of trust and trustworthiness
    • H. S. James, "The Trust Paradox: A Survey of Economic Inquiries into the Nature of Trust and Trustworthiness," Journal of Economic Behavior and Organization, vol. 47, no. 3, 2002.
    • (2002) Journal of Economic Behavior and Organization , vol.47 , Issue.3
    • James, H.S.1
  • 20
    • 0035508757 scopus 로고    scopus 로고
    • Game theory and the design of self-configuring, adaptive wireless networks
    • Nov.
    • A. B. MacKenzie and S. B. Wicker, "Game Theory and the Design of Self-Configuring, Adaptive Wireless Networks," IEEE Commun. Mag., vol. 39, no. 11, pp. 126-131, Nov. 2001.
    • (2001) IEEE Commun. Mag. , vol.39 , Issue.11 , pp. 126-131
    • MacKenzie, A.B.1    Wicker, S.B.2
  • 21
    • 0019480612 scopus 로고
    • The evolution of cooperation
    • March
    • R. Axelrod, "The Evolution of Cooperation," Science, vol. 211, no. 4489, pp. 1390-1396, March 1981.
    • (1981) Science , vol.211 , Issue.4489 , pp. 1390-1396
    • Axelrod, R.1
  • 24
    • 84857857240 scopus 로고    scopus 로고
    • Olli lagerspetz: Trust. The tacit demand
    • Dec., Published Springer Netherlands
    • B. Lahno, "Olli Lagerspetz: Trust. The Tacit Demand," Ethical Theory and Moral Practice, vol. 2, no. 4, pp. 433-435, Dec. 1999, Published Springer Netherlands.
    • (1999) Ethical Theory and Moral Practice , vol.2 , Issue.4 , pp. 433-435
    • Lahno, B.1
  • 25
    • 84857874463 scopus 로고    scopus 로고
    • 16 Sept. [Online], (sociology)
    • Wikipedia-Trust in Social Science, 16 Sept. 2009 [Online]: http://en.wikipedia.org/wiki/Trust (sociology)
    • (2009) Wikipedia-Trust in Social Science
  • 27
    • 11744348112 scopus 로고
    • The street-level epistemology of trust
    • R. Hardin, "The Street-Level Epistemology of Trust," Politics and Society, vol. 21, no. 4, 1993, pp. 505-529.
    • (1993) Politics and Society , vol.21 , Issue.4 , pp. 505-529
    • Hardin, R.1
  • 28
    • 58149405986 scopus 로고
    • Interpersonal trust, trustworthiness, and gullibility
    • Jan.
    • J. B. Rotter, "Interpersonal Trust, Trustworthiness, and Gullibility," American Psychologist, vol. 35, no. 1, Jan. 1980, pp. 1-7.
    • (1980) American Psychologist , vol.35 , Issue.1 , pp. 1-7
    • Rotter, J.B.1
  • 29
    • 77957974589 scopus 로고    scopus 로고
    • The meanings of trust Carlson school of management, University of Minnesota
    • D. McKnight and N. Chevany, "The Meanings of Trust," Carlson School of Management, University of Minnesota, Technical Report TR 94-04, 1996.
    • (1996) Technical Report TR 94-04
    • McKnight, D.1    Chevany, N.2
  • 30
    • 34247525112 scopus 로고    scopus 로고
    • An integrative model of organizational trust: Past, present, and future
    • F. D. Schoorman, R. C. Mayer, and J. H. Davis, "An Integrative Model of Organizational Trust: Past, Present, and Future," Academy of Management Review, vol. 31, no. 2, 2007, pp. 344-354.
    • (2007) Academy of Management Review , vol.31 , Issue.2 , pp. 344-354
    • Schoorman, F.D.1    Mayer, R.C.2    Davis, J.H.3
  • 31
    • 85010007963 scopus 로고    scopus 로고
    • Trust in automation: Designing for appropriate reliance
    • Spring
    • J. D. Lee and K. A. See, "Trust in Automation: Designing for Appropriate Reliance," Human Factors, vol. 46, no. 1, Spring 2004, pp. 50-80.
    • (2004) Human Factors , vol.46 , Issue.1 , pp. 50-80
    • Lee, J.D.1    See, K.A.2
  • 32
    • 0031171736 scopus 로고    scopus 로고
    • Humans and automation: Use, misuse, disuse, abuse
    • R. Parasuraman, "Humans and Automation: Use, Misuse, Disuse, Abuse," Human Factors, vol. 39, no. 2, 1997, pp. 230-253.
    • (1997) Human Factors , vol.39 , Issue.2 , pp. 230-253
    • Parasuraman, R.1
  • 33
    • 19944433808 scopus 로고    scopus 로고
    • The pudding of trust
    • S. Staab (Editor), "The Pudding of Trust," IEEE Intelligent Systems, vol. 19, no. 5, pp. 74-88, 2004.
    • (2004) IEEE Intelligent Systems , vol.19 , Issue.5 , pp. 74-88
    • Staab, S.1
  • 34
    • 70749134483 scopus 로고    scopus 로고
    • Toward a human trust model for mobile ad-hoc networks
    • 5-7 May, Cambridge University, Cambridge, UK
    • L. Capra, "Toward a Human Trust Model for Mobile Ad-hoc Networks," Proc. 2nd UK-UbiNet Workshop, 5-7 May 2004, Cambridge University, Cambridge, UK.
    • (2004) Proc. 2nd UK-UbiNet Workshop
    • Capra, L.1
  • 35
    • 33947387917 scopus 로고    scopus 로고
    • Trust management in distributed systems
    • Feb.
    • H. Li and M. Singhal, "Trust Management in Distributed Systems," Computers, vol. 40, no.2, Feb. 2007, pp. 45-53.
    • (2007) Computers , vol.40 , Issue.2 , pp. 45-53
    • Li, H.1    Singhal, M.2
  • 38
    • 33845467053 scopus 로고    scopus 로고
    • Inferring trust relationships in webbased social networks
    • Nov.
    • J. Golbeck and J. Hendler, "Inferring Trust Relationships in Webbased Social Networks," ACM Transactions in Internet Technology, Nov. 2006, vol. 6, no. 4, pp. 497-529.
    • (2006) ACM Transactions in Internet Technology , vol.6 , Issue.4 , pp. 497-529
    • Golbeck, J.1    Hendler, J.2
  • 40
    • 0034309389 scopus 로고    scopus 로고
    • Adding security and trust to multiagent systems
    • Oct.
    • H. C. Wong, K. P. Sycara, "Adding Security and Trust to Multiagent Systems," Applied Artificial Intelligence, vol. 14, no. 9, pp. 927-941, Oct. 2000.
    • (2000) Applied Artificial Intelligence , vol.14 , Issue.9 , pp. 927-941
    • Wong, H.C.1    Sycara, K.P.2
  • 41
    • 35048832333 scopus 로고    scopus 로고
    • Analyzing the relationship between risk and trust
    • LNCS, Springer-Verlag
    • A. Josang and S. LoPresti, "Analyzing the Relationship between Risk and Trust," Proc. 2nd Int'l Conf. Trust Management, LNCS, Springer-Verlag, 2004, pp. 135-145.
    • (2004) Proc. 2nd Int'l Conf. Trust Management , pp. 135-145
    • Josang, A.1    LoPresti, S.2
  • 46
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Feb.
    • Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, Feb. 2006, pp. 305-317.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.L.1    Yu, W.2    Han, Z.3    Liu, K.J.R.4
  • 47
    • 29844435578 scopus 로고    scopus 로고
    • A localized trust management scheme for ad hoc networks
    • March
    • C. R. Davis, "A Localized Trust Management Scheme for Ad Hoc Networks," Proc. 3rd Int'l Conf. on Networking, March 2004, pp. 671-675.
    • (2004) Proc. 3rd Int'l Conf. on Networking , pp. 671-675
    • Davis, C.R.1
  • 50
    • 33144465377 scopus 로고    scopus 로고
    • On trust models and trust evaluation metrics for ad hoc networks
    • Feb.
    • G. Theodorakopoulos and J. S. Baras, "On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, Feb. 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.2
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 51
    • 34547277464 scopus 로고    scopus 로고
    • An objective trust management framework for mobile ad hoc networks
    • 22-25 Apr.
    • R. Li, J. Li, P. Liu, H. H. Chen, "An Objective Trust Management Framework for Mobile Ad Hoc Networks," Proc. IEEE 65th Vehicular Technology Conf., 22-25 Apr. 2007, pp. 56-60.
    • (2007) Proc. IEEE 65th Vehicular Technology Conf. , pp. 56-60
    • Li, R.1    Li, J.2    Liu, P.3    Chen, H.H.4
  • 52
    • 42649129419 scopus 로고    scopus 로고
    • Future trust management framework for mobile ad hoc networks: Security in mobile ad hoc networks
    • Apr.
    • J. Li, R. Li, and J. Kato, "Future Trust Management Framework for Mobile Ad Hoc Networks: Security in Mobile Ad Hoc Networks," IEEE Commun. Mag., vol. 46, no. 4, Apr. 2008, pp. 108-114.
    • (2008) IEEE Commun. Mag. , vol.46 , Issue.4 , pp. 108-114
    • Li, J.1    Li, R.2    Kato, J.3
  • 55
    • 84892591410 scopus 로고    scopus 로고
    • A survey of security issues in mobile ad hoc and sensor networks
    • D. Djenouri, L. Khelladi and N. Badache, "A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks," IEEE Commun. Surveys and Tutorials, vol. 7, no. 4, pp. 2-28, 2005.
    • (2005) IEEE Commun. Surveys and Tutorials , vol.7 , Issue.4 , pp. 2-28
    • Djenouri, D.1    Khelladi, L.2    Badache, N.3
  • 58
    • 34548321774 scopus 로고    scopus 로고
    • Detecting wormhole attacks in wireless networks using connectivity information
    • Anchorage, AK, 6-12 May
    • R. Maheshwari and S. R. Jie Gao Das, "Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information," Proc. 26th IEEE Int'l Conf. on Computer Communications, Anchorage, AK, 6-12 May 2007, pp. 107-115.
    • (2007) Proc. 26th IEEE Int'l Conf. on Computer Communications , pp. 107-115
    • Maheshwari, R.1    Jie Gao Das, S.R.2
  • 60
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May
    • Y. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security and Privacy, vol. 2, no. 3, May 2004, pp. 28-39.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.1    Perrig, A.2
  • 62
    • 30344461584 scopus 로고    scopus 로고
    • The denial-of-service dance
    • Nov./Dec.
    • P. L. Campbell, "The Denial-of-Service Dance," IEEE Security and Privacy, vol. 3, no. 6, pp. 34-40, Nov./Dec. 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.6 , pp. 34-40
    • Campbell, P.L.1
  • 66
    • 78651538701 scopus 로고    scopus 로고
    • Reliable routing against selective packet drop attack in DSR based manet
    • Aug.
    • N. Bhalaji and A. Shanmugam, "Reliable Routing against Selective Packet Drop Attack in DSR based MANET," Journal of Software, vol. 4, no. 6, Aug. 2009, pp. 536-543.
    • (2009) Journal of Software , vol.4 , Issue.6 , pp. 536-543
    • Bhalaji, N.1    Shanmugam, A.2
  • 69
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in dynamic ad-hoc networks
    • Lausanne, CH, 9-11 June
    • S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes-Fairness In Dynamic Ad-hoc NeTworks," Proc. 3rd IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, CH, 9-11 June 2002, pp. 226-236.
    • (2002) Proc. 3rd IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing , pp. 226-236
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 70
    • 0036452448 scopus 로고    scopus 로고
    • Context-aware detection of selfish nodes in DSR based ad hoc networks
    • Taipeh, Taiwan
    • K. Paul and D. Westhoff, "Context-Aware Detection of Selfish Nodes in DSR based Ad Hoc Networks," Proc. IEEE Globecom Conf., Taipeh, Taiwan, 2002.
    • (2002) Proc. IEEE Globecom Conf.
    • Paul, K.1    Westhoff, D.2
  • 71
    • 85113133621 scopus 로고    scopus 로고
    • CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • Porotoz, Slovenia
    • P. Michiardi and R. Molva, "CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," The 6th IFIP Conf. on Security Communications, and Multimedia, Porotoz, Slovenia, 2002.
    • (2002) The 6th IFIP Conf. on Security Communications, and Multimedia
    • Michiardi, P.1    Molva, R.2
  • 72
    • 4544283175 scopus 로고    scopus 로고
    • SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks
    • March
    • Q. He, D. Wu, and P. Khosla, "SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-Hoc Networks," Proc. IEEE Wireless Communications and Networking Conf., vol. 2, pp. 825-830, March 2004.
    • (2004) Proc. IEEE Wireless Communications and Networking Conf. , vol.2 , pp. 825-830
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 73
    • 77953097829 scopus 로고    scopus 로고
    • Trust-based adaptive on demand ad hoc routing protocol
    • Huntsville, Alabama
    • R. K. Nekkanti and C. Lee, "Trust-based Adaptive On Demand Ad Hoc Routing Protocol," Proc. 42th Annual ACM Southeast Regional Conf., Huntsville, Alabama, 2004, pp. 88-93.
    • (2004) Proc. 42th Annual ACM Southeast Regional Conf. , pp. 88-93
    • Nekkanti, R.K.1    Lee, C.2
  • 74
    • 11244296240 scopus 로고    scopus 로고
    • A trust model based routing protocol for secure ad hoc networks
    • Bug Sky, Montana, 6-13 Mar.
    • X. Li, M. R. Lyu and J. Liu, "A Trust Model Based Routing Protocol for Secure Ad Hoc Networks," Proc. 2004 IEEE Aerospace Conf., Bug Sky, Montana, 6-13 Mar. 2004, vol. 2, pp. 1286-1295.
    • (2004) Proc. 2004 IEEE Aerospace Conf. , vol.2 , pp. 1286-1295
    • Li, X.1    Lyu, M.R.2    Liu, J.3
  • 77
    • 29844453185 scopus 로고    scopus 로고
    • Towards designing a trust routing solution in mobile ad hoc networks
    • T. Ghosh, N. Pissinou, and K. Makki, "Towards Designing a Trust Routing Solution in Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 10, pp. 985-995, 2005.
    • (2005) Mobile Networks and Applications , vol.10 , pp. 985-995
    • Ghosh, T.1    Pissinou, N.2    Makki, K.3
  • 84
    • 47049106826 scopus 로고    scopus 로고
    • An efficient scheme to motivate cooperation in mobile ad hoc networks
    • Athens, Greece, 19-25 June
    • S. Soltanali, S. Pirahesh, S. Niksefat, and M. Sabaei, "An Efficient Scheme to Motivate Cooperation in Mobile Ad Hoc Networks," Int'l Conf. on Networking and Services, Athens, Greece, 19-25 June 2007, pp. 98-103.
    • (2007) Int'l Conf. on Networking and Services , pp. 98-103
    • Soltanali, S.1    Pirahesh, S.2    Niksefat, S.3    Sabaei, M.4
  • 86
    • 38749146509 scopus 로고    scopus 로고
    • Analysis of a reputation system for mobile ad hoc networks with liars
    • Mar.
    • J. Mundinger and J. Le Boudec, "Analysis of a Reputation System for Mobile Ad Hoc Networks with Liars," Performance Evaluation, vol. 65, no. 3-4, pp. 212-226, Mar. 2008.
    • (2008) Performance Evaluation , vol.65 , Issue.3-4 , pp. 212-226
    • Mundinger, J.1    Le Boudec, J.2
  • 88
    • 67650685627 scopus 로고    scopus 로고
    • Robust and efficient communication overlays for trust authority computations
    • March
    • S. Reidt, S. D. Wolthusen, and S. Balfe, "Robust and Efficient Communication Overlays for Trust Authority Computations," Proc. 2009 IEEE Sarnoff Symposium, March 2009.
    • (2009) Proc. 2009 IEEE Sarnoff Symposium
    • Reidt, S.1    Wolthusen, S.D.2    Balfe, S.3
  • 89
    • 70749150776 scopus 로고    scopus 로고
    • Misbehavior detection using implicit trust relations in the AODV routing protocol
    • Vancouver, Canada, 29-31 Aug.
    • M. A. Ayachi, C. Bidan, T. Abbes, and A. Bouhoula, "Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol," 2009 Int'l Conf. on Computational Science and Engineering, Vancouver, Canada, vol. 2, 29-31 Aug. 2009, pp. 802-808.
    • (2009) 2009 Int'l Conf. on Computational Science and Engineering , vol.2 , pp. 802-808
    • Ayachi, M.A.1    Bidan, C.2    Abbes, T.3    Bouhoula, A.4
  • 93
    • 33646410469 scopus 로고    scopus 로고
    • Performance comparison of trust-based reactive routing protocols
    • June
    • A. A. Pirzada, C. McDonald, and A. Datta, "Performance Comparison of Trust-based Reactive Routing Protocols," IEEE Trans. Mobile Comput., vol. 5, no. 6, June 2006, pp. 695-710.
    • (2006) IEEE Trans. Mobile Comput. , vol.5 , Issue.6 , pp. 695-710
    • Pirzada, A.A.1    McDonald, C.2    Datta, A.3
  • 96
    • 84860703392 scopus 로고    scopus 로고
    • Cluster-based intrusion detection (CBID) architecture for mobile ad hoc networks
    • Gold Coast, Australia, 21-26 May
    • E. Ahmed, K. Samad and W. Mahmood, "Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks." AusCERT Asia Pacific Information Technology Security Conf., Gold Coast, Australia, 21-26 May 2006.
    • (2006) AusCERT Asia Pacific Information Technology Security Conf.
    • Ahmed, E.1    Samad, K.2    Mahmood, W.3
  • 98
    • 11244320485 scopus 로고    scopus 로고
    • URSA: Ubiquitous and robust access control for mobile ad hoc networks
    • Dec.
    • H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks," IEEE/ACM Trans. Netw., vol. 12, no. 6, Dec. 2004, pp. 1049-1063.
    • (2004) IEEE/ACM Trans. Netw. , vol.12 , Issue.6 , pp. 1049-1063
    • Luo, H.1    Kong, J.2    Zerfos, P.3    Lu, S.4    Zhang, L.5
  • 101
    • 66149153135 scopus 로고    scopus 로고
    • Markov chain trust model for trust value analysis and key management in distributed multicast MANETs
    • May
    • B. J. Chang and S. L. Kuo, "Markov Chain Trust Model for Trust Value Analysis and Key Management in Distributed Multicast MANETs," IEEE Trans. Veh. Technol., vol. 58, no. 4, May 2009, pp. 1846-1863.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.4 , pp. 1846-1863
    • Chang, B.J.1    Kuo, S.L.2
  • 104
    • 14344264010 scopus 로고    scopus 로고
    • Cooperative games, phase transition on graphs and distributed trust in MANETs
    • Atlantis, Bahamas, 14-17 Dec.
    • J. S. Baras and T. Jiang, "Cooperative Games, Phase Transition on Graphs and Distributed Trust in MANETs," Proc. 43th IEEE Conf. on Decision and Control, Atlantis, Bahamas, 14-17 Dec. 2004, vol. 1, pp. 93-98.
    • (2004) Proc. 43th IEEE Conf. on Decision and Control , vol.1 , pp. 93-98
    • Baras, J.S.1    Jiang, T.2
  • 105
    • 63449141260 scopus 로고    scopus 로고
    • A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks
    • Vancouver, British Columbia, Canada
    • A. Boukerche and Y. Ren, "A Security Management Scheme using a Novel Computational Reputation Model for Wireless and Mobile Ad Hoc Networks," Proc. Int'l Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, Vancouver, British Columbia, Canada, pp. 88-95, 2008.
    • (2008) Proc. Int'l Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems , pp. 88-95
    • Boukerche, A.1    Ren, Y.2
  • 107
    • 70749147824 scopus 로고    scopus 로고
    • Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks
    • Vancouver, Canada, 29-31 Aug.
    • J. H. Cho, A. Swami and I.R. Chen, "Modeling and Analysis of Trust Management for Cognitive Mission-driven Group Communication Systems in Mobile Ad Hoc Networks," 2009 Int'l Conf. on Computational Science and Engineering, vol. 2, Vancouver, Canada, 29-31 Aug. 2009, pp. 641-650.
    • (2009) 2009 Int'l Conf. on Computational Science and Engineering , vol.2 , pp. 641-650
    • Cho, J.H.1    Swami, A.2    Chen, I.R.3
  • 109
    • 45749109010 scopus 로고    scopus 로고
    • Sybilguard: Defending against sybil attacks via social networks
    • June
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, "SybilGuard: Defending Against Sybil Attacks via Social Networks," IEEE/ACM Trans. Netw., vol. 16, no. 3, June 2008, pp. 576-589.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.3 , pp. 576-589
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.D.4
  • 112
    • 70749090738 scopus 로고    scopus 로고
    • Repcom: Towards reputation composition over peer-to-peer communities
    • Vancouver, Canada, 29-31 Aug. 2009
    • G. Yin, D. Shi, H. Wang, and M. Guo, "RepCom: Towards Reputation Composition over Peer-to-Peer Communities," 2009 Int'l Conf. on Computational Science and Engineering, vol. 2, Vancouver, Canada, 29-31 Aug. 2009, pp. 765-771.
    • 2009 Int'l Conf. on Computational Science and Engineering , vol.2 , pp. 765-771
    • Yin, G.1    Shi, D.2    Wang, H.3    Guo, M.4
  • 113
    • 70749131896 scopus 로고    scopus 로고
    • Multidimensional dynamic trust management for federated services
    • Vancouver, Canada, 29-31 Aug.
    • L. Boursas and W. Hommel, "Multidimensional Dynamic Trust Management for Federated Services," 2009 Int'l Conf. on Computational Science and Engineering, vol. 2, Vancouver, Canada, 29-31 Aug. 2009, pp.684-689.
    • (2009) 2009 Int'l Conf. on Computational Science and Engineering , vol.2 , pp. 684-689
    • Boursas, L.1    Hommel, W.2
  • 118
    • 84857858813 scopus 로고    scopus 로고
    • U. S. Army Research Laboratory Program Announcement for Network Science CTA [Online], 23 Jan
    • U. S. Army Research Laboratory, Program Announcement for Network Science CTA, [Online]: http://www.arl.army.mil/www/DownloadedInternetPages/CurrentPages/ CTA/Documents/NSCTAFINAL23JAN09.pdf, 23 Jan. 2009.
    • (2009)
  • 125
    • 0003839495 scopus 로고
    • Ph. D. Dissertation, Department of Mathematics and Computer Science: University of Stirling
    • S. Marsh, "Formalizing Trust as a Computational Concept," Ph. D. Dissertation, Department of Mathematics and Computer Science: University of Stirling, 1994.
    • (1994) Formalizing Trust as a Computational Concept
    • Marsh, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.