메뉴 건너뛰기




Volumn 63, Issue 9, 2014, Pages 4647-4658

Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning

Author keywords

Mobile ad hoc networks (MANETs); security; trust management; uncertain reasoning

Indexed keywords

ARTIFICIAL INTELLIGENCE; BAYESIAN NETWORKS; FORMAL LOGIC; INFERENCE ENGINES; MOBILE TELECOMMUNICATION SYSTEMS; SECURITY OF DATA; TELECOMMUNICATION NETWORKS;

EID: 84909606246     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2014.2313865     Document Type: Article
Times cited : (177)

References (45)
  • 4
    • 84863962542 scopus 로고    scopus 로고
    • Joint topology control and authentication design in mobile ad hoc networks with cooperative communications
    • Jul.
    • Q. Guan, F. R. Yu, S. Jiang, and V. Leung, "Joint topology control and authentication design in mobile ad hoc networks with cooperative communications," IEEE Trans. Veh. Tech., vol. 61, no. 6, pp. 2674-2685, Jul. 2012.
    • (2012) IEEE Trans. Veh. Tech. , vol.61 , Issue.6 , pp. 2674-2685
    • Guan, Q.1    Yu, F.R.2    Jiang, S.3    Leung, V.4
  • 5
    • 84894179025 scopus 로고    scopus 로고
    • Security and Quality of Service (QoS) co-design in cooperative mobile ad hoc networks
    • Jul.
    • F. R. Yu, H. Tang, S. Bu, and D. Zheng, "Security and Quality of Service (QoS) co-design in cooperative mobile ad hoc networks," EURASIP J. Wireless Commun. Netw., vol. 2013, pp. 188-190, Jul. 2013.
    • (2013) EURASIP J. Wireless Commun. Netw. , vol.2013 , pp. 188-190
    • Yu, F.R.1    Tang, H.2    Bu, S.3    Zheng, D.4
  • 6
    • 84897912432 scopus 로고    scopus 로고
    • A mean field game theoretic approach for security enhancements in mobile ad hoc networks
    • Mar.
    • Y. Wang, F. R. Yu, H. Tang, and M. Huang, "A mean field game theoretic approach for security enhancements in mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1616-1627, Mar. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.3 , pp. 1616-1627
    • Wang, Y.1    Yu, F.R.2    Tang, H.3    Huang, M.4
  • 7
    • 84856962285 scopus 로고    scopus 로고
    • The next 10 years of DoD wireless networking research
    • Nov.
    • J. Chapin and V.W. Chan, "The next 10 years of DoD wireless networking research," in Proc. IEEE Milcom, Nov. 2011, pp. 2155-2245.
    • (2011) Proc. IEEE Milcom , pp. 2155-2245
    • Chapin, J.1    Chan, V.W.2
  • 8
    • 79952830393 scopus 로고    scopus 로고
    • Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks
    • Mar.
    • S. Bu, F. R. Yu, P. Liu, P. Manson, and H. Tang, "Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks," IEEE Trans. Veh. Technol., vol. 60, no. 3, pp. 1025-1036, Mar. 2011.
    • (2011) IEEE Trans. Veh. Technol. , vol.60 , Issue.3 , pp. 1025-1036
    • Bu, S.1    Yu, F.R.2    Liu, P.3    Manson, P.4    Tang, H.5
  • 10
    • 33751529199 scopus 로고    scopus 로고
    • Securing mobile ad hoc networks with certificateless public keys
    • Oct.-Dec.
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Trans. Dependable Secure Comput., vol. 3, no. 4, pp. 386-399, Oct.-Dec. 2006.
    • (2006) IEEE Trans. Dependable Secure Comput. , vol.3 , Issue.4 , pp. 386-399
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 11
    • 67349212443 scopus 로고    scopus 로고
    • Securing resource-constrained wireless ad hoc networks
    • Apr.
    • Y. Fang, X. Zhu, and Y. Zhang, "Securing resource-constrained wireless ad hoc networks," IEEE Wireless Comm., vol. 16, no. 2, pp. 24-30, Apr. 2009.
    • (2009) IEEE Wireless Comm. , vol.16 , Issue.2 , pp. 24-30
    • Fang, Y.1    Zhu, X.2    Zhang, Y.3
  • 12
    • 85008009601 scopus 로고    scopus 로고
    • A hierarchical identity based key management scheme in tactical mobile ad hoc networks
    • Dec.
    • F. R. Yu, H. Tang, P. Mason, and F. Wang, "A hierarchical identity based key management scheme in tactical mobile ad hoc networks," IEEE Trans. Netw. Serv. Manag., vol. 7, no. 4, pp. 258-267, Dec. 2010.
    • (2010) IEEE Trans. Netw. Serv. Manag. , vol.7 , Issue.4 , pp. 258-267
    • Yu, F.R.1    Tang, H.2    Mason, P.3    Wang, F.4
  • 13
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Aug.
    • S. Marti, T. Giuli, K. Lai, and M. Maker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. ACM MobiCom, Aug. 2000, pp. 255-265.
    • (2000) Proc. ACM MobiCom , pp. 255-265
    • Marti, S.1    Giuli, T.2    Lai, K.3    Maker, M.4
  • 14
    • 60049091288 scopus 로고    scopus 로고
    • SPREAD: Improving network security by multipath routing in mobile ad hoc networks
    • Apr.
    • W. Lou, W. Liu, Y. Zhang, and Y. Fang, "SPREAD: Improving network security by multipath routing in mobile ad hoc networks," ACM Wireless Netw., vol. 15, no. 3, pp. 279-294, Apr. 2009.
    • (2009) ACM Wireless Netw. , vol.15 , Issue.3 , pp. 279-294
    • Lou, W.1    Liu, W.2    Zhang, Y.3    Fang, Y.4
  • 15
    • 79956131066 scopus 로고    scopus 로고
    • AOS: An anonymous overlay system for mobile ad hoc networks
    • May
    • R. Zhang, Y. Zhang, and Y. Fang, "AOS: An anonymous overlay system for mobile ad hoc networks," ACM Wireless Netw., vol. 17, no. 4, pp. 843-859, May 2011.
    • (2011) ACM Wireless Netw. , vol.17 , Issue.4 , pp. 843-859
    • Zhang, R.1    Zhang, Y.2    Fang, Y.3
  • 17
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Feb.
    • A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," IEEE Wireless Comm., vol. 11, no. 1, pp. 48-60, Feb. 2004.
    • (2004) IEEE Wireless Comm. , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 18
    • 80052948907 scopus 로고    scopus 로고
    • Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks
    • Sep.
    • S. Bu, F. R. Yu, X. P. Liu, and H. Tang, "Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks," IEEE Trans. Wireless Commun., vol. 10, no. 9, pp. 3064-3073, Sep. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.9 , pp. 3064-3073
    • Bu, S.1    Yu, F.R.2    Liu, X.P.3    Tang, H.4
  • 20
    • 33745940320 scopus 로고    scopus 로고
    • A quantitative trust establishment framework for reliable data packet delivery in MANETs
    • Nov.
    • C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "A quantitative trust establishment framework for reliable data packet delivery in MANETs," in Proc. 3rd ACM Workshop SASN, Nov. 2005, pp. 1-10.
    • (2005) Proc. 3rd ACM Workshop SASN , pp. 1-10
    • Zouridaki, C.1    Mark, B.L.2    Hejmo, M.3    Thomas, R.K.4
  • 21
    • 2442597363 scopus 로고    scopus 로고
    • Performance analysis of the confidant protocol
    • Jun.
    • S. Buchegger and J.-Y. L. Boudec, "Performance analysis of the confidant protocol," in Proc. ACM MobiHoc, Jun. 2002, pp. 226-236.
    • (2002) Proc. ACM MobiHoc , pp. 226-236
    • Buchegger, S.1    Boudec, J.-Y.L.2
  • 22
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Feb.
    • Y. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 305-317, Feb. 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.1    Yu, W.2    Han, Z.3    Liu, K.J.R.4
  • 25
    • 0036362188 scopus 로고    scopus 로고
    • An evidential model of distributed reputation management
    • Jul.
    • B. Yu and M. P. Singh, "An evidential model of distributed reputation management," in Proc. ACM AAMAS, Jul. 2002, pp. 294-301.
    • (2002) Proc. ACM AAMAS , pp. 294-301
    • Yu, B.1    Singh, M.P.2
  • 28
    • 84857844113 scopus 로고    scopus 로고
    • A survey on trust management for mobile ad hoc networks
    • Fourth Quarter
    • J. H. Cho, A. Swami, and I. R. Chen, "A survey on trust management for mobile ad hoc networks," IEEE Commun. Surv. Tuts., vol. 13, no. 4, pp. 562-583, Fourth Quarter, 2011.
    • (2011) IEEE Commun. Surv. Tuts. , vol.13 , Issue.4 , pp. 562-583
    • Cho, J.H.1    Swami, A.2    Chen, I.R.3
  • 29
    • 30144440941 scopus 로고    scopus 로고
    • Dempster-Shafer theory for intrusion detection in ad hoc networks
    • Nov./Dec.
    • T. M. Chen and V. Venkataramanan, "Dempster-Shafer theory for intrusion detection in ad hoc networks," IEEE Internet Comput., vol. 9, no. 6, pp. 35-41, Nov./Dec. 2005.
    • (2005) IEEE Internet Comput. , vol.9 , Issue.6 , pp. 35-41
    • Chen, T.M.1    Venkataramanan, V.2
  • 31
    • 79951868603 scopus 로고    scopus 로고
    • Building a trust-aware dynamic routing solution for wireless sensor neworks
    • Dec.
    • H. Deng, Y. Yang, G. Jin, R. Xu, and W. Shi, "Building a trust-aware dynamic routing solution for wireless sensor neworks," in Proc. IEEE GLOBECOM Workshop, Dec. 2010, pp. 153-157.
    • (2010) Proc. IEEE GLOBECOM Workshop , pp. 153-157
    • Deng, H.1    Yang, Y.2    Jin, G.3    Xu, R.4    Shi, W.5
  • 32
    • 14844315770 scopus 로고    scopus 로고
    • Reputation-based framework for high integrity sensor networks
    • Oct.
    • S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proc. ACM SASN, Oct. 2004, pp. 66-77.
    • (2004) Proc. ACM SASN , pp. 66-77
    • Ganeriwal, S.1    Srivastava, M.B.2
  • 38
    • 84881131647 scopus 로고    scopus 로고
    • Vulnerability analysis of the optimized link state routing protocol version 2 (OLSRv2)
    • Feb.
    • T. Clausen and U. Herberg, "Vulnerability analysis of the Optimized Link State Routing Protocol version 2 (OLSRv2)," in Proc. IEEE WCNIS, Feb. 2010, pp. 628-633.
    • (2010) Proc. IEEE WCNIS , pp. 628-633
    • Clausen, T.1    Herberg, U.2
  • 39
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in wireless ad hoc networks
    • Oct.
    • H. Deng, W. Li, and D. Agrawal, "Routing security in wireless ad hoc networks," IEEE Commun. Mag., vol. 40, no. 10, pp. 70-75, Oct. 2002.
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.10 , pp. 70-75
    • Deng, H.1    Li, W.2    Agrawal, D.3
  • 40
    • 77956948315 scopus 로고    scopus 로고
    • A survey on trust and reputation management systems in wireless communications
    • Oct.
    • H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, "A survey on trust and reputation management systems in wireless communications," Proc. IEEE, vol. 98, no. 10, pp. 1755-1772, Oct. 2010.
    • (2010) Proc. IEEE , vol.98 , Issue.10 , pp. 1755-1772
    • Yu, H.1    Shen, Z.2    Miao, C.3    Leung, C.4    Niyato, D.5
  • 41
    • 84863586452 scopus 로고    scopus 로고
    • Light-weight trust-based routing protocol for mobile ad-hoc networks
    • Jun.
    • N. Marchang and R. Datta, "Light-weight trust-based routing protocol for mobile ad-hoc networks," IET Inf. Security, vol. 6, no. 2, pp. 77-83, Jun. 2012.
    • (2012) IET Inf. Security , vol.6 , Issue.2 , pp. 77-83
    • Marchang, N.1    Datta, R.2
  • 42
    • 36849093903 scopus 로고    scopus 로고
    • OLSRv2 implementation and performance evaluation with link layer feedback
    • Aug.
    • Y. Owada, T. Maeno, and H. Imai, "OLSRv2 implementation and performance evaluation with link layer feedback," in Proc. ACM IWCMC, Aug. 2007, pp. 67-72.
    • (2007) Proc. ACM IWCMC , pp. 67-72
    • Owada, Y.1    Maeno, T.2    Imai, H.3
  • 44
    • 84881165884 scopus 로고    scopus 로고
    • [Online]
    • Trust platform module. [Online]. Available: http://www.trustedcomputinggroup.org/
    • Trust Platform Module
  • 45
    • 77952492719 scopus 로고    scopus 로고
    • Biologically inspired consensus-based spectrum sensing in mobile ad hoc networks with cognitive radios
    • May
    • F. R. Yu, M. Huang, and H. Tang, "Biologically inspired consensus-based spectrum sensing in mobile ad hoc networks with cognitive radios," IEEE Netw., vol. 24, no. 3, pp. 26-30, May 2010.
    • (2010) IEEE Netw. , vol.24 , Issue.3 , pp. 26-30
    • Yu, F.R.1    Huang, M.2    Tang, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.