-
1
-
-
80052854156
-
Securing the internet of things
-
R. Roman, P. Najera, and J. Lopez, "Securing the Internet of Things," Computer, vol. 44, no. 9, pp. 51-58, 2011.
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
2
-
-
84870682499
-
A new data aggregation scheme via adaptive compression for wireless sensor networks
-
P. Kasirajan, C. Larsen, and S. Jagannathan, "A new data aggregation scheme via adaptive compression for wireless sensor networks," ACM Trans. Sensor Netw., vol. 9, no. 1, pp. 1-5, 2012.
-
(2012)
ACM Trans. Sensor Netw.
, vol.9
, Issue.1
, pp. 1-5
-
-
Kasirajan, P.1
Larsen, C.2
Jagannathan, S.3
-
3
-
-
84866925146
-
Localized geographic routing to a mobile sink with guaranteed delivery in sensor networks
-
Oct
-
X. Li, J. Yang, A. Nayak, and I. Stojmenovic, "Localized geographic routing to a mobile sink with guaranteed delivery in sensor networks," IEEE J. Sel. Areas Commun., vol. 30, no. 9, pp. 1719-1729, Oct. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.9
, pp. 1719-1729
-
-
Li, X.1
Yang, J.2
Nayak, A.3
Stojmenovic, I.4
-
4
-
-
81555203548
-
Distributed iterative quantization for interference characterization in wireless networks
-
V. Kapnadak, M. Senel, and E. Coyle, "Distributed iterative quantization for interference characterization in wireless networks," Digit. Signal Process., vol. 22, no. 1, pp. 96-105, 2012.
-
(2012)
Digit. Signal Process.
, vol.22
, Issue.1
, pp. 96-105
-
-
Kapnadak, V.1
Senel, M.2
Coyle, E.3
-
5
-
-
77956377841
-
Designing and deploying a buildingwide cognitive radio network testbed
-
Sep
-
T. Newman, S. Hasan, and D. DePoy, "Designing and deploying a buildingwide cognitive radio network testbed," IEEE Commun. Mag., vol. 48, no. 9, pp. 106-112, Sep. 2010.
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.9
, pp. 106-112
-
-
Newman, T.1
Hasan, S.2
Depoy, D.3
-
6
-
-
84863078189
-
Secure cooperative data storage and query processing in unattended tiered sensor networks
-
Feb
-
R. Zhang, J. Shi, Y. Zhang, and J. Sun, "Secure cooperative data storage and query processing in unattended tiered sensor networks," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 433-441, Feb. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.2
, pp. 433-441
-
-
Zhang, R.1
Shi, J.2
Zhang, Y.3
Sun, J.4
-
7
-
-
80052159598
-
Exploiting trust relations for nash equilibrium efficiency in ad hoc networks
-
S. Zheng, T. Jiang, and J. Baras, "Exploiting trust relations for Nash equilibrium efficiency in ad hoc networks," in Proc. IEEE Int. Conf. Commun. (ICC), 2011, pp. 1-5.
-
(2011)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 1-5
-
-
Zheng, S.1
Jiang, T.2
Baras, J.3
-
8
-
-
77952925515
-
Key predistribution approach in wireless sensor networks using lu matrix
-
Aug
-
H. Dai and H. Xu, "Key predistribution approach in wireless sensor networks using lu matrix," IEEE Sensors J., vol. 10, no. 8, pp. 1399-1409, Aug. 2010.
-
(2010)
IEEE Sensors J.
, vol.10
, Issue.8
, pp. 1399-1409
-
-
Dai, H.1
Xu, H.2
-
9
-
-
70450164574
-
A survey of secure mobile ad hoc routing protocols
-
Oct.
-
L. Abusalah, A. Khokhar, and M. Guizani, "A survey of secure mobile ad hoc routing protocols," IEEE Commun. Surveys Tuts., vol. 10, no. 4, pp. 78-93, Oct. 2008.
-
(2008)
IEEE Commun. Surveys Tuts.
, vol.10
, Issue.4
, pp. 78-93
-
-
Abusalah, L.1
Khokhar, A.2
Guizani, M.3
-
10
-
-
77951127884
-
A collusion-resistant routing scheme for noncooperative wireless ad hoc networks
-
Apr
-
S. Zhong and F. Wu, "A collusion-resistant routing scheme for noncooperative wireless ad hoc networks," IEEE/ACM Trans. Netw., vol. 18, no. 2, pp. 582-595, Apr. 2010.
-
(2010)
IEEE/ACM Trans. Netw.
, vol.18
, Issue.2
, pp. 582-595
-
-
Zhong, S.1
Wu, F.2
-
11
-
-
39149127588
-
Cryptographic versus trust-based methods for manet routing security
-
J. Cordasco and S. Wetzel, "Cryptographic versus trust-based methods for MANET routing security," Electron. Notes Theor. Comput. Sci., vol. 197, no. 2, pp. 131-140, 2008.
-
(2008)
Electron. Notes Theor. Comput. Sci.
, vol.197
, Issue.2
, pp. 131-140
-
-
Cordasco, J.1
Wetzel, S.2
-
12
-
-
70349682512
-
Fdac: Toward fine-grained distributed data access control in wireless sensor networks
-
S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks," in Proc. IEEE INFOCOM, 2009, pp. 963-971.
-
(2009)
Proc. IEEE INFOCOM
, pp. 963-971
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
13
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Mar.
-
M. Das, "Two-factor user authentication in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1086-1090, Mar. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.1
-
14
-
-
41849094781
-
Mitigating dos attacks against broadcast authentication in wireless sensor networks
-
P. Ning, A. Liu, and W. Du, "Mitigating DoS attacks against broadcast authentication in wireless sensor networks,"ACMTrans. Sensor Netw., vol. 4, no. 1, pp. 1-35, 2008.
-
(2008)
ACMTrans. Sensor Netw.
, vol.4
, Issue.1
, pp. 1-35
-
-
Ning, P.1
Liu, A.2
Du, W.3
-
15
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
Feb.
-
G. Theodorakopoulos and J. Baras, "On trust models and trust evaluation metrics for ad hoc networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 318-328, Feb. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 318-328
-
-
Theodorakopoulos, G.1
Baras, J.2
-
16
-
-
77953306999
-
A formal study of trust-based routing in wireless ad hoc networks
-
C. Zhang, X. Zhu, Y. Song, and Y. Fang, "A formal study of trust-based routing in wireless ad hoc networks," in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Zhang, C.1
Zhu, X.2
Song, Y.3
Fang, Y.4
-
17
-
-
84883463898
-
Trust prediction and trust-based source routing in mobile ad hoc networks
-
Sep
-
H. Xia, Z. Jia, X. Li, L. Ju, and E. Sha, "Trust prediction and trust-based source routing in mobile ad hoc networks," Ad Hoc Netw., vol. 11, no. 7, pp. 2096-2114, Sep. 2013.
-
(2013)
Ad Hoc Netw.
, vol.11
, Issue.7
, pp. 2096-2114
-
-
Xia, H.1
Jia, Z.2
Li, X.3
Ju, L.4
Sha, E.5
-
18
-
-
84877811867
-
Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks
-
Y. Ren and A. Boukerche, "Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks," in Proc. IEEE Int. Conf. Commun. (ICC), 2009, pp. 5535-5539.
-
(2009)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 5535-5539
-
-
Ren, Y.1
Boukerche, A.2
-
19
-
-
80052158517
-
Trust-based and energy-Aware incentive routing protocol for multi-hop wireless networks
-
M. Mahmoud and X. Shen, "Trust-based and energy-Aware incentive routing protocol for multi-hop wireless networks," in Proc. IEEE Int. Conf. Commun. (ICC), 2011, pp. 1-5.
-
Proc. IEEE Int. Conf. Commun. (ICC)
, vol.2011
, pp. 1-5
-
-
Mahmoud, M.1
Shen, X.2
-
20
-
-
51249121100
-
Modeling and managing the trust for wireless and mobile ad hoc networks
-
Y. Ren and A. Boukerche, "Modeling and managing the trust for wireless and mobile ad hoc networks," in Proc. IEEE Int. Conf. Commun. (ICC), 2008, pp. 2129-2133.
-
(2008)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 2129-2133
-
-
Ren, Y.1
Boukerche, A.2
-
21
-
-
79952097418
-
A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory
-
R. Feng, X. Xu, X. Zhou, and J. Wan, "A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory," Sensors, vol. 11, no. 2, pp. 1345-1360, 2011.
-
(2011)
Sensors
, vol.11
, Issue.2
, pp. 1345-1360
-
-
Feng, R.1
Xu, X.2
Zhou, X.3
Wan, J.4
-
22
-
-
77951542715
-
A trust management scheme for enhancing security in pervasive wireless networks
-
Nov. 30/Dec.
-
M. Denko, T. Sun, I. Woungang, J. Rodrigues, and H.-C. Chao, "A trust management scheme for enhancing security in pervasive wireless networks," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Nov. 30/Dec. 4, 2009, pp. 1-6.
-
(2009)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM)
, vol.4
, pp. 1-6
-
-
Denko, M.1
Sun, T.2
Woungang, I.3
Rodrigues, J.4
Chao, H.-C.5
-
23
-
-
77950866308
-
Trust management systems for wireless sensor networks: Best practices
-
J. Lopez, R. Roman, I. Agudo, and C. Fernandez-Gago, "Trust management systems for wireless sensor networks: Best practices," Comput. Commun., vol. 33, no. 9, pp. 1086-1093, 2010.
-
(2010)
Comput. Commun.
, vol.33
, Issue.9
, pp. 1086-1093
-
-
Lopez, J.1
Roman, R.2
Agudo, I.3
Fernandez-Gago, C.4
-
24
-
-
0345851235
-
Wireless integrated network sensors
-
G. Pottie and W. Kaiser, "Wireless integrated network sensors," Commun. ACM, vol. 43, no. 5, pp. 51-58, 2000.
-
(2000)
Commun. ACM
, vol.43
, Issue.5
, pp. 51-58
-
-
Pottie, G.1
Kaiser, W.2
-
25
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, M. Baker et al., "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Ann. Int. Conf. Mobile Comput. Netw., ACM, 2000, pp. 255-265.
-
(2000)
Proc. 6th Ann. Int. Conf. Mobile Comput. Netw., ACM
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
27
-
-
50949088090
-
Trust aware routing in mobile ad hoc networks
-
L. Abusalah, A. Khokhar, and M. Guizani, "Trust aware routing in mobile ad hoc networks," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), 2006, pp. 1-5.
-
(2006)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-5
-
-
Abusalah, L.1
Khokhar, A.2
Guizani, M.3
-
28
-
-
77952125612
-
Reputation-based security protocol for manets in highly mobile disconnection-prone environments
-
S. Zakhary and M. Radenkovic, "Reputation-based security protocol for manets in highly mobile disconnection-prone environments," in Proc. 7th Int. Conf. Wireless On-demand Netw. Syst. Serv., 2010, pp. 161-167.
-
(2010)
Proc. 7th Int. Conf. Wireless On-demand Netw. Syst. Serv.
, pp. 161-167
-
-
Zakhary, S.1
Radenkovic, M.2
-
29
-
-
47949102142
-
Trust-based evolutionary game model assisting aodv routing against selfishness
-
K. Komathy and P. Narayanasamy, "Trust-based evolutionary game model assisting AODV routing against selfishness," J. Netw. Comput. Appl., vol. 31, no. 4, pp. 446-471, 2008.
-
(2008)
J. Netw. Comput. Appl.
, vol.31
, Issue.4
, pp. 446-471
-
-
Komathy, K.1
Narayanasamy, P.2
-
30
-
-
56449123247
-
Game theoretic approach in routing protocol for wireless ad hoc networks
-
M. Naserian and K. Tepe, "Game theoretic approach in routing protocol for wireless ad hoc networks," Ad Hoc Netw., vol. 7, no. 3, pp. 569-578, 2009.
-
(2009)
Ad Hoc Netw.
, vol.7
, Issue.3
, pp. 569-578
-
-
Naserian, M.1
Tepe, K.2
-
31
-
-
80052141648
-
Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy
-
C. Kamhoua, N. Pissinou, and K. Makki, "Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy," in Proc. IEEE Int. Conf. Commun. (ICC), 2011, pp. 1-6.
-
(2011)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 1-6
-
-
Kamhoua, C.1
Pissinou, N.2
Makki, K.3
-
32
-
-
13244286379
-
The ns manual
-
Univ. Southern California, Los Angeles, CA, USA
-
K. Fall and K. Varadhan, "The NS Manual," The VINT Project, Inform. Sci. Inst., Univ. Southern California, Los Angeles, CA, USA, vol. 1, 2002.
-
(2002)
The VINT Project, Inform. Sci. Inst
, vol.1
-
-
Fall, K.1
Varadhan, K.2
-
33
-
-
67349173961
-
A trust degree based access control in grid environments
-
J. Luo, X. Ni, and J. Yong, "A trust degree based access control in grid environments," Inf. Sci., vol. 179, no. 15, pp. 2618-2628, 2009.
-
(2009)
Inf. Sci.
, vol.179
, Issue.15
, pp. 2618-2628
-
-
Luo, J.1
Ni, X.2
Yong, J.3
-
34
-
-
84858038684
-
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
-
Y. Yu, K. Li, W. Zhou, and P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures," J. Netw. Comput. Appl., vol. 35, no. 3, pp. 867-880, 2012.
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, Issue.3
, pp. 867-880
-
-
Yu, Y.1
Li, K.2
Zhou, W.3
Li, P.4
-
35
-
-
84885310593
-
Tc-bac: A trust and centrality degree based access control model in wireless sensor networks
-
Nov
-
J. Duan, D. Gao, C. H. Foh, and H. Zhang, "TC-BAC:A trust and centrality degree based access control model in wireless sensor networks," Ad Hoc Netw., vol. 11, no 8, pp. 2675-2692, Nov. 2013.
-
(2013)
Ad Hoc Netw.
, vol.11
, Issue.8
, pp. 2675-2692
-
-
Duan, J.1
Gao, D.2
Foh, C.H.3
Zhang, H.4
-
36
-
-
33646410469
-
Performance comparison of trust-based reactive routing protocols
-
Jun.
-
A. A. Pirzada, C. Mcdonald, and A. Datta, "Performance comparison of trust-based reactive routing protocols," IEEE Trans. Mobile Comput., vol. 5, no. 6, pp. 695-710, Jun. 2006.
-
(2006)
IEEE Trans. Mobile Comput.
, vol.5
, Issue.6
, pp. 695-710
-
-
Pirzada, A.A.1
McDonald, C.2
Datta, A.3
-
37
-
-
0001980141
-
The evolution of strategies in the iterated prisoner's dilemma
-
R. Axelrod, "The evolution of strategies in the iterated prisoner's dilemma," in Proc. Genetic Algorithms Simul. Anneal., 1987, pp. 32-41.
-
(1987)
Proc. Genetic Algorithms Simul. Anneal.
, pp. 32-41
-
-
Axelrod, R.1
-
38
-
-
0002180201
-
Evolutionary prisoner's dilemma game on a square lattice
-
G. Szabó and C. Töke, "Evolutionary prisoner's dilemma game on a square lattice," Phys. Rev. E, Stat. Phys. Plasmas Fluids Relat. Interdiscip. Top., vol. 58, no. 1, pp. 69-74, 1998.
-
(1998)
Phys. Rev. E, Stat. Phys. Plasmas Fluids Relat. Interdiscip. Top.
, vol.58
, Issue.1
, pp. 69-74
-
-
Szabó, G.1
Töke, C.2
-
39
-
-
28844437381
-
Phase diagrams for an evolutionary prisoner's dilemma game on two-dimensional lattices
-
Oct.
-
G. Szabó, J. Vukov, and A. Szolnoki, "Phase diagrams for an evolutionary prisoner's dilemma game on two-dimensional lattices," IEEE Trans. Mobile Comput., vol. 72, no. 4, p. 047107, Oct. 2005.
-
(2005)
IEEE Trans. Mobile Comput.
, vol.72
, Issue.4
, pp. 047107
-
-
Szabó, G.1
Vukov, J.2
Szolnoki, A.3
-
40
-
-
79952946238
-
Evolution of strategies with different representation schemes in a spatial iterated prisoner's dilemma game
-
Mar
-
H. Ishibuchi, H. Ohyanagi, and Y. Nojima, "Evolution of strategies with different representation schemes in a spatial iterated prisoner's dilemma Game," IEEE Trans. Comput. Intell. AI Games, vol. 3, no. 1, pp. 67-82, Mar. 2011.
-
(2011)
IEEE Trans. Comput. Intell. AI Games
, vol.3
, Issue.1
, pp. 67-82
-
-
Ishibuchi, H.1
Ohyanagi, H.2
Nojima, Y.3
-
41
-
-
24944503071
-
Aodvjr, aodv simplified
-
I. D. Chakeres and L. Klein-Berndt, "AODVjr, AODV simplified," ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 6, no. 3, pp. 100-101, 2002.
-
(2002)
ACM SIGMOBILE Mobile Comput. Commun. Rev.
, vol.6
, Issue.3
, pp. 100-101
-
-
Chakeres, I.D.1
Klein-Berndt, L.2
-
42
-
-
56749140937
-
Defense of trust management vulnerabilities in distributed networks
-
Feb.
-
Y. Sun, Z. Han, and K. J. R. Liu, "Defense of trust management vulnerabilities in distributed networks," IEEE Commun. Mag., vol. 46, no. 2, pp. 112-119, Feb. 2008.
-
(2008)
IEEE Commun. Mag.
, vol.46
, Issue.2
, pp. 112-119
-
-
Sun, Y.1
Han, Z.2
Liu, K.J.R.3
-
43
-
-
77951584764
-
Trust-Aware in network aggregation for wireless sensor networks
-
H. Deng, G. Jin, K. Sun, R. Xu, M. Lyell, and J. A. Luke, "Trust-Aware in network aggregation for wireless sensor networks," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), 2009, pp. 1-8.
-
(2009)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-8
-
-
Deng, H.1
Jin, G.2
Sun, K.3
Xu, R.4
Lyell, M.5
Luke, J.A.6
-
44
-
-
84874709128
-
Netfence: Preventing internet denial of service from inside out
-
X. Liu, X. Yang, and Y. Xia, "NetFence: Preventing internet denial of service from inside out," ACM SIGCOMM Comput. Commun. Rev., vol. 40, no. 4, pp. 255-266, 2010.
-
(2010)
ACM SIGCOMM Comput. Commun. Rev.
, vol.40
, Issue.4
, pp. 255-266
-
-
Liu, X.1
Yang, X.2
Xia, Y.3
|