메뉴 건너뛰기




Volumn , Issue , 2014, Pages 171-177

Trust establishment based on bayesian networks for threat mitigation in mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

BAYESIAN NETWORKS; DROPS; MILITARY COMMUNICATIONS; PACKET LOSS;

EID: 84912534750     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2014.34     Document Type: Conference Paper
Times cited : (14)

References (25)
  • 2
    • 61349175330 scopus 로고    scopus 로고
    • Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks
    • J. Liu, F. Yu, C.-H. Lung, and H. Tang, "Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 806-815, 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.2 , pp. 806-815
    • Liu, J.1    Yu, F.2    Lung, C.-H.3    Tang, H.4
  • 3
    • 84863962542 scopus 로고    scopus 로고
    • Joint topology control and security in mobile ad hoc networks with cooperative communications
    • Q. Guan, F. Yu, S. Jiang, and V. Leung, "Joint topology control and security in mobile ad hoc networks with cooperative communications," IEEE Trans. Veh. Tech., vol. 61, no. 6, pp. 2674-2685, 2012.
    • (2012) IEEE Trans. Veh. Tech. , vol.61 , Issue.6 , pp. 2674-2685
    • Guan, Q.1    Yu, F.2    Jiang, S.3    Leung, V.4
  • 4
    • 84897912432 scopus 로고    scopus 로고
    • A mean field game theoretic approach for security enhancements in mobile ad hoc networks
    • Y. Wang, F. Yu, H. Tang, and M. Huang, "A mean field game theoretic approach for security enhancements in mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1616-1627, 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.3 , pp. 1616-1627
    • Wang, Y.1    Yu, F.2    Tang, H.3    Huang, M.4
  • 7
    • 84909606246 scopus 로고    scopus 로고
    • Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning
    • Feb. accepted for publication
    • Z. Wei, H. Tang, F. Yu, M. Wang, and P. Mason, "Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning," IEEE Trans. Veh. Tech., Feb. 2014. accepted for publication.
    • (2014) IEEE Trans. Veh. Tech
    • Wei, Z.1    Tang, H.2    Yu, F.3    Wang, M.4    Mason, P.5
  • 8
    • 84857844113 scopus 로고    scopus 로고
    • A survey on trust management for mobile ad hoc networks
    • J. H. Cho, A. Swami, and I. R. Chen, "A survey on trust management for mobile ad hoc networks," IEEE Commun. Surveys & Tutorials, vol. 13, no. 4, pp. 562-583, 2011.
    • (2011) IEEE Commun. Surveys & Tutorials , vol.13 , Issue.4 , pp. 562-583
    • Cho, J.H.1    Swami, A.2    Chen, I.R.3
  • 11
    • 57649208449 scopus 로고    scopus 로고
    • BNWSN: Bayesian network trust model for wireless sensor networks
    • (Amman), Aug.
    • M. Momani, S. Challa, and R. Alhmouz, "BNWSN: Bayesian network trust model for wireless sensor networks," in Proc. MIC-CCA 2008, (Amman), Aug. 2008.
    • (2008) Proc. MIC-CCA 2008
    • Momani, M.1    Challa, S.2    Alhmouz, R.3
  • 12
    • 34250782069 scopus 로고    scopus 로고
    • A Bayesian network based trust model for improving collaboration in mobile ad hoc networks
    • (Hanoi, Vietnam), Mar.
    • C. T. Nguyen, O. Camp, and S. Loiseau, "A Bayesian network based trust model for improving collaboration in mobile ad hoc networks," in Proc. IEEE Research, Innovation and Vision for the Future, (Hanoi, Vietnam), Mar. 2007.
    • (2007) Proc. IEEE Research, Innovation and Vision for the Future
    • Nguyen, C.T.1    Camp, O.2    Loiseau, S.3
  • 13
    • 84912555498 scopus 로고    scopus 로고
    • Bayesian network trust model in peer-to-peer networks
    • (Melbourne, Australia), Jul.
    • Y. Wang and J. Vassileva, "Bayesian network trust model in peer-to-peer networks," in Proc. AAMAS'03, (Melbourne, Australia), Jul. 2003.
    • (2003) Proc. AAMAS'03
    • Wang, Y.1    Vassileva, J.2
  • 15
    • 58049134979 scopus 로고    scopus 로고
    • A bayesian filter to detect misbehaving nodes in manets
    • (Tangier, Morocco), Nov.
    • Y. Beghriche, V. Toubiana, and H. Labiod, "A bayesian filter to detect misbehaving nodes in manets," in Proc. NTMS'08, (Tangier, Morocco), Nov. 2008.
    • (2008) Proc. NTMS'08
    • Beghriche, Y.1    Toubiana, V.2    Labiod, H.3
  • 17
    • 84891816433 scopus 로고    scopus 로고
    • A QoS-based trust approach for service selection and composition via bayesian networks
    • (Santa Clara, CA, USA), Jun.
    • M. Mehdi, N. Bouguila, and J. Bentahar, "A QoS-based trust approach for service selection and composition via bayesian networks," in Proc. IEEE ICWS'13, (Santa Clara, CA, USA), Jun. 2013.
    • (2013) Proc. IEEE ICWS'13
    • Mehdi, M.1    Bouguila, N.2    Bentahar, J.3
  • 18
    • 77956948315 scopus 로고    scopus 로고
    • A survey on trust and reputation management systems in wireless communications
    • H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, "A survey on trust and reputation management systems in wireless communications," Proc. IEEE, vol. 98, no. 10, pp. 1755-1772, 2010.
    • (2010) Proc. IEEE , vol.98 , Issue.10 , pp. 1755-1772
    • Yu, H.1    Shen, Z.2    Miao, C.3    Leung, C.4    Niyato, D.5
  • 19
    • 0002351377 scopus 로고    scopus 로고
    • Recommender systems in e-commerce
    • (Denver, Colorado, USA)
    • J. B. Schafer, J. Konstan, and J. Riedl, "Recommender systems in e-commerce," in Proc. ACM EC '99, (Denver, Colorado, USA), 1999.
    • (1999) Proc. ACM EC '99
    • Schafer, J.B.1    Konstan, J.2    Riedl, J.3
  • 20
    • 33745940320 scopus 로고    scopus 로고
    • A quantitative trust establishment framework for reliable data packet delivery in MANETs
    • (Alexandria, VA, USA), Nov.
    • C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "A quantitative trust establishment framework for reliable data packet delivery in MANETs," in Proc. 3rd ACM Workshop on SASN'05, (Alexandria, VA, USA), Nov. 2005.
    • (2005) Proc. 3rd ACM Workshop on SASN'05
    • Zouridaki, C.1    Mark, B.L.2    Hejmo, M.3    Thomas, R.K.4
  • 22
    • 0026374073 scopus 로고
    • Bayesian networks without tears
    • E. Charniak, "Bayesian networks without tears," AI Magazine, vol. 12, no. 4, pp. 50-63, 1991.
    • (1991) AI Magazine , vol.12 , Issue.4 , pp. 50-63
    • Charniak, E.1
  • 24
    • 84881134371 scopus 로고    scopus 로고
    • Security enhancement for mobile ad hoc networks routing with OLSRv2
    • (Baltimore, MD, USA), Apr.
    • Z. Wei, H. Tang, F. R. Yu, and M. Wang, "Security enhancement for mobile ad hoc networks routing with OLSRv2," in Proc. SPIE Defence, Security, and Sensing 2013, (Baltimore, MD, USA), Apr. 2013.
    • (2013) Proc. SPIE Defence, Security, and Sensing 2013
    • Wei, Z.1    Tang, H.2    Yu, F.R.3    Wang, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.