-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E,. Wireless sensor networks: a survey. Computer Networks (Elsevier) Journal 2002; 38: 393-422.
-
(2002)
Computer Networks (Elsevier) Journal
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
2942686425
-
Sensor networks: Evolution, opportunities, and challenges
-
Chee YC, Kumar SP,. Sensor networks: evolution, opportunities, and challenges. Proceedings of the IEEE 2003; 91: 1247-1256.
-
(2003)
Proceedings of the IEEE
, vol.91
, pp. 1247-1256
-
-
Chee, Y.C.1
Kumar, S.P.2
-
3
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Yan S, Wei Y, Zhu H, Ray KJL,. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE JSAC Special Issue on Security in Wireless ad hoc Networks 2006; 4: 305-317.
-
(2006)
IEEE JSAC Special Issue on Security in Wireless Ad Hoc Networks
, vol.4
, pp. 305-317
-
-
Yan, S.1
Wei, Y.2
Zhu, H.3
Ray, K.J.L.4
-
5
-
-
70350070568
-
Group based trust management scheme for clustered wireless sensor networks
-
Shaikh RA, Jameel H, D'Auriol BJ, Lee H, Lee S, Song YJ,. Group based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 2009; 11: 1045-9219.
-
(2009)
IEEE Transactions on Parallel and Distributed Systems
, vol.11
, pp. 1045-9219
-
-
Shaikh, R.A.1
Jameel, H.2
D'Auriol, B.J.3
Lee, H.4
Lee, S.5
Song, Y.J.6
-
6
-
-
70349308780
-
Analysis of security threats, requirements, technologies and standards in wireless sensor networks
-
Lopez J, Roman R, Alcaraz C,. Analysis of security threats, requirements, technologies and standards in wireless sensor networks. LNCS 2009; 5705: 289-338.
-
(2009)
LNCS
, vol.5705
, pp. 289-338
-
-
Lopez, J.1
Roman, R.2
Alcaraz, C.3
-
7
-
-
84858038684
-
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
-
Yanli Y, Keqiu L, Wanlei Z, Ping L,. Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. Journal of Network and Computer Application 2011; 35 (3): 867-880.
-
(2011)
Journal of Network and Computer Application
, vol.35
, Issue.3
, pp. 867-880
-
-
Yanli, Y.1
Keqiu, L.2
Wanlei, Z.3
Ping, L.4
-
9
-
-
77956948315
-
Survey of trust and reputation management systems in wireless communications
-
Han Y, Zhiqi S, Chunyan M, Leung C, Niyato D,. Survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE 2010; 98 (10): 1755-1772.
-
(2010)
Proceedings of the IEEE
, vol.98
, Issue.10
, pp. 1755-1772
-
-
Han, Y.1
Zhiqi, S.2
Chunyan, M.3
Leung, C.4
Niyato, D.5
-
10
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
Barcelona, Spain
-
Yan S, Wei Y, Zhu H, Ray KJL,. A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks, In Proceeding of IEEE INFOCOM, Barcelona, Spain, 2006; 1-13.
-
(2006)
Proceeding of IEEE INFOCOM
, pp. 1-13
-
-
Yan, S.1
Wei, Y.2
Zhu, H.3
Ray, K.J.L.4
-
11
-
-
36549067155
-
Trust-based security for wireless ad hoc and sensor networks
-
Boukerch A, Xu L, Khatib KE,. Trust-based security for wireless ad hoc and sensor networks. Computer Communications 2007; 30: 3905.
-
(2007)
Computer Communications
, vol.30
, pp. 3905
-
-
Boukerch, A.1
Xu, L.2
Khatib, K.E.3
-
16
-
-
80052880154
-
Autonomic trust management in a component based software system
-
Zheng Y,. Autonomic trust management in a component based software system. IEEE Transactions on Dependable and Secure Computing 2010; 8 (6): 810-823.
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.6
, pp. 810-823
-
-
Zheng, Y.1
-
17
-
-
84928946195
-
Trust establishment in ad hoc and sensor networks
-
Efthimia A, Gritzalis A, Skianis G,. Trust establishment in ad hoc and sensor networks. CRITIS 2006; 12: 179-194.
-
(2006)
CRITIS
, vol.12
, pp. 179-194
-
-
Efthimia, A.1
Gritzalis, A.2
Skianis, G.3
-
18
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Jsang A, Ismail R, Boyd C,. A survey of trust and reputation systems for online service provision. Decision Support Systems 2007; 43 (2): 618-644.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Jsang, A.1
Ismail, R.2
Boyd, C.3
-
19
-
-
56749140937
-
Defense of trust management vulnerabilities in distributed networks
-
Yan S, Zhu H, Liu KJR,. Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine 2008; 46: 112-119.
-
(2008)
IEEE Communications Magazine
, vol.46
, pp. 112-119
-
-
Yan, S.1
Zhu, H.2
Liu, K.J.R.3
-
20
-
-
70349567489
-
Security threats scenario in trust and reputation models for distributed systems
-
Felix GM, Perez GM,. Security threats scenario in trust and reputation models for distributed systems. Computers and Security 2009; 28: 545-556.
-
(2009)
Computers and Security
, vol.28
, pp. 545-556
-
-
Felix, G.M.1
Perez, G.M.2
-
21
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
Berkeley, California, USA
-
Newsome J, Shi E, Song D, Perrig A,. The sybil attack in sensor networks: analysis and defenses, In Proceedings of IPSN '04, Berkeley, California, USA, 2004; 259-268.
-
(2004)
Proceedings of IPSN '04
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
22
-
-
84947273682
-
The Sybil attack
-
Cambridge, MA, USA
-
Microsoft JD, Douceur JR, Donath JS,. The Sybil attack, In IPTPS, Cambridge, MA, USA, 2002; 251-260.
-
(2002)
IPTPS
, pp. 251-260
-
-
Microsoft, J.D.1
Douceur, J.R.2
Donath, J.S.3
-
23
-
-
33745931868
-
Time synchronization attacks in sensor networks
-
Alexandria, VA, USA
-
Manzo M, Roosta T, Sastry S,. Time synchronization attacks in sensor networks, In Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, Alexandria, VA, USA, 2005; 107-116.
-
(2005)
Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 107-116
-
-
Manzo, M.1
Roosta, T.2
Sastry, S.3
-
24
-
-
67249114800
-
Securing time-synchronization protocols in sensor networks: Attack detection and self-healing
-
New Orleans, LA, USA
-
Yang Y, Sun Y,. Securing time-synchronization protocols in sensor networks: attack detection and self-healing, In Proceeding of Global Telecommunications Conference, IEEE GLOBECOM, New Orleans, LA, USA, 2008; 1-6.
-
(2008)
Proceeding of Global Telecommunications Conference, IEEE GLOBECOM
, pp. 1-6
-
-
Yang, Y.1
Sun, Y.2
-
25
-
-
51349133681
-
Detecting selective forwarding attacks in wireless sensor networks using support vector machines
-
Melbourne, Australia
-
Kaplantzis S, Shilton A, Mani N, Sekercioglu YA,. Detecting selective forwarding attacks in wireless sensor networks using support vector machines, In Proceedings of 3rd International Symposium on Intelligent Sensors, Sensor Networks and Information Processing, Melbourne, Australia, 2007; 335-340.
-
(2007)
Proceedings of 3rd International Symposium on Intelligent Sensors, Sensor Networks and Information Processing
, pp. 335-340
-
-
Kaplantzis, S.1
Shilton, A.2
Mani, N.3
Sekercioglu, Y.A.4
-
26
-
-
80052432106
-
A GTRSSN: Gaussian trust and reputation system for sensor networks
-
Mohammad M, Subhash Ch,. A GTRSSN: Gaussian trust and reputation system for sensor networks. SCSS 2007; 1: 343-347.
-
(2007)
SCSS
, vol.1
, pp. 343-347
-
-
Mohammad, M.1
Subhash, C.2
-
27
-
-
0039135571
-
Trust among strangers in internet transactions: Empirical analysis of ebays reputation system
-
Boston, USA
-
Resnick P, Zeckhauser R,. Trust among strangers in internet transactions: empirical analysis of ebays reputation system, In Working Paper for the NBER Workshop on Empirical Studies of Electronic Commerce, Boston, USA, 2001; 1-26.
-
(2001)
Working Paper for the NBER Workshop on Empirical Studies of Electronic Commerce
, pp. 1-26
-
-
Resnick, P.1
Zeckhauser, R.2
-
28
-
-
55849152101
-
Countering sinkhole and black hole attacks on sensor networks using dynamic trust management
-
Marrakech, Morocco
-
Roy SD, Singh SA, Choudhury S, Debnath NC,. Countering sinkhole and black hole attacks on sensor networks using dynamic trust management, In Proceedings of ISCC 2008, Marrakech, Morocco, 2008; 537-542.
-
(2008)
Proceedings of ISCC 2008
, pp. 537-542
-
-
Roy, S.D.1
Singh, S.A.2
Choudhury, S.3
Debnath, N.C.4
-
29
-
-
79953777183
-
A survey of wormhole-based attacks and their countermeasures in wireless sensor networks
-
Meghdadi M, Ozdemir S, Gler I,. A survey of wormhole-based attacks and their countermeasures in wireless sensor networks. IETE Technical Review 2011; 28: 89-102.
-
(2011)
IETE Technical Review
, vol.28
, pp. 89-102
-
-
Meghdadi, M.1
Ozdemir, S.2
Gler, I.3
-
30
-
-
78751643529
-
Reputation-based role assignment for role-based access control in wireless sensor networks
-
Misra S, Vaish A,. Reputation-based role assignment for role-based access control in wireless sensor networks. Computer Communications 2011; 34: 281-294.
-
(2011)
Computer Communications
, vol.34
, pp. 281-294
-
-
Misra, S.1
Vaish, A.2
-
32
-
-
84867342180
-
Trust based secured routing in wireless multimedia sensor networks
-
Madrid, Spain
-
Kiran YB, Mallapur JD, Hiremath JD,. Trust based secured routing in wireless multimedia sensor networks, In Proceeding of Computational Intelligence, Communication Systems and Networks (CICSyN), Madrid, Spain, 2012; 53-58.
-
(2012)
Proceeding of Computational Intelligence, Communication Systems and Networks (CICSyN)
, pp. 53-58
-
-
Kiran, Y.B.1
Mallapur, J.D.2
Hiremath, J.D.3
-
34
-
-
84862733493
-
A survey of access control schemes in wireless sensor networks
-
Faye Y, Niang I, Noel T,. A survey of access control schemes in wireless sensor networks. World Academy of Science, Engineering and Technology 2011; 59: 814-823.
-
(2011)
World Academy of Science, Engineering and Technology
, vol.59
, pp. 814-823
-
-
Faye, Y.1
Niang, I.2
Noel, T.3
-
35
-
-
70449463534
-
Trust based data disclosure in sensor networks
-
Dresden, Germany
-
Aivaloglou E, Gritzalis S,. Trust based data disclosure in sensor networks, In Proceedings of IEEE Communications, ICC '09, Dresden, Germany, 2009; 1-6.
-
(2009)
Proceedings of IEEE Communications, ICC '09
, pp. 1-6
-
-
Aivaloglou, E.1
Gritzalis, S.2
-
36
-
-
84873883962
-
How the role-based trust management can be applied to wireless sensor networks
-
Felkner A,. How the role-based trust management can be applied to wireless sensor networks. Journal of Telecommunications and Information Technology 2012; 4: 70-77.
-
(2012)
Journal of Telecommunications and Information Technology
, vol.4
, pp. 70-77
-
-
Felkner, A.1
-
37
-
-
54949103489
-
Functional reputation based reliable data aggregation and transmission for wireless sensor networks
-
Ozdemir S,. Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Computer Communications 2008; 31: 3941-3953.
-
(2008)
Computer Communications
, vol.31
, pp. 3941-3953
-
-
Ozdemir, S.1
-
38
-
-
80155154403
-
A secure data aggregation based trust management approach for dealing with untrustworthy motes in sensor network
-
Taipei, Taiwan
-
Poolsappasit N, Madria S,. A secure data aggregation based trust management approach for dealing with untrustworthy motes in sensor network, In Proceedings of International Conference on Parallel Processing, Taipei, Taiwan, 2011; 138-147.
-
(2011)
Proceedings of International Conference on Parallel Processing
, pp. 138-147
-
-
Poolsappasit, N.1
Madria, S.2
-
39
-
-
67549118456
-
Secure. Data aggregation in wireless sensor networks: A comprehensive overview
-
Ozdemir S, Xiao Y,. Secure. Data aggregation in wireless sensor networks: a comprehensive overview. Computer Networks 2009; 53: 2022-2037.
-
(2009)
Computer Networks
, vol.53
, pp. 2022-2037
-
-
Ozdemir, S.1
Xiao, Y.2
-
40
-
-
77956432336
-
Trust-based secure aggregation in wireless sensor networks
-
Hur J, Lee YH, Hong S, Yoon H,. Trust-based secure aggregation in wireless sensor networks. International Conference on Computing, Communications and Control Technologies 2005; 3: 1-6.
-
(2005)
International Conference on Computing, Communications and Control Technologies
, vol.3
, pp. 1-6
-
-
Hur, J.1
Lee, Y.H.2
Hong, S.3
Yoon, H.4
-
42
-
-
84862138560
-
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
-
Bao F, Chen I, Chang MJ, Cho JH,. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management 2012; 9 (2): 169-183.
-
(2012)
IEEE Transactions on Network and Service Management
, vol.9
, Issue.2
, pp. 169-183
-
-
Bao, F.1
Chen, I.2
Chang, M.J.3
Cho, J.H.4
-
45
-
-
2442519150
-
Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks
-
Phoenix, Arizona, USA
-
Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A,. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks, In Proceedings of Performance, Computing, and Communications, Phoenix, Arizona, USA, 2004; 463-469.
-
(2004)
Proceedings of Performance, Computing, and Communications
, pp. 463-469
-
-
Tanachaiwiwat, S.1
Dave, P.2
Bhindwale, R.3
Helmy, A.4
-
46
-
-
36949013183
-
DRBTS: Distributed reputation system based beacon trust system
-
Indianapolis, USA
-
Srinivasan A, Teitelbaum J, Wu J,. DRBTS: distributed reputation system based beacon trust system, In Proceedings of Dependable, Autonomic and Secure Computing, Indianapolis, USA, 2006; 277-283.
-
(2006)
Proceedings of Dependable, Autonomic and Secure Computing
, pp. 277-283
-
-
Srinivasan, A.1
Teitelbaum, J.2
Wu, J.3
-
47
-
-
77951128966
-
A comparative review of wireless sensor network mote technologies
-
IEEE, Christchurch, New Zealand
-
Healy M, Van de Ven P, Hayes MJ, Nelson J, Newe T, Lewis E,. A comparative review of wireless sensor network mote technologies, In Proceeding of Sensors Conference, IEEE, Christchurch, New Zealand, 2009; 1439-1442.
-
(2009)
Proceeding of Sensors Conference
, pp. 1439-1442
-
-
Healy, M.1
Van De Ven, P.2
Hayes, M.J.3
Nelson, J.4
Newe, T.5
Lewis, E.6
-
48
-
-
79959538975
-
Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): A comprehensive overview
-
Ishmanov F, Malik AS, Kim SW,. Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): a comprehensive overview. European Transactions on Telecommunications 2011; 22: 151-167.
-
(2011)
European Transactions on Telecommunications
, vol.22
, pp. 151-167
-
-
Ishmanov, F.1
Malik, A.S.2
Kim, S.W.3
-
49
-
-
78651546090
-
An extended energy consumption analysis of reputation-based trust management schemes of wireless sensor networks
-
Shaikh RA, Lee YK, Lee SY,. An extended energy consumption analysis of reputation-based trust management schemes of wireless sensor networks. Journal of Networks, Academy Publishers 2010; 5 (3): 283-291.
-
(2010)
Journal of Networks, Academy Publishers
, vol.5
, Issue.3
, pp. 283-291
-
-
Shaikh, R.A.1
Lee, Y.K.2
Lee, S.Y.3
-
50
-
-
70449637850
-
Design of a simulation framework to evaluate trust models for collaborative intrusion detection
-
Paris, France
-
Fung CF, Zhang J, Aib I, Boutaba R, Cohen R,. Design of a simulation framework to evaluate trust models for collaborative intrusion detection, In Proceedings of IFIP Network and Service Security Conference (N2S 09), Paris, France, 2009; 1-5.
-
(2009)
Proceedings of IFIP Network and Service Security Conference (N2S 09)
, pp. 1-5
-
-
Fung, C.F.1
Zhang, J.2
Aib, I.3
Boutaba, R.4
Cohen, R.5
-
51
-
-
42649129419
-
Future trust management framework for mobile ad hoc network
-
Jie L, Ruidong L, Jien K,. Future trust management framework for mobile ad hoc network. IEEE Communications Magazine 2008; 46: 108-114.
-
(2008)
IEEE Communications Magazine
, vol.46
, pp. 108-114
-
-
Jie, L.1
Ruidong, L.2
Jien, K.3
-
52
-
-
79960423670
-
Location-aware, trust-based detection and isolation of compromised nodes in WSNs
-
Garth VC, Lance H, Niki P,. Location-aware, trust-based detection and isolation of compromised nodes in WSNs. International Journal of Network Security 2011; 2: 107-113.
-
(2011)
International Journal of Network Security
, vol.2
, pp. 107-113
-
-
Garth, V.C.1
Lance, H.2
Niki, P.3
-
53
-
-
65549114586
-
Efficient monitoring approach for reputation system-based trust aware routing wireless sensor networks
-
Maarouf UB, Naseer AR,. Efficient monitoring approach for reputation system-based trust aware routing wireless sensor networks. IET Communications 2009; 3: 846-858.
-
(2009)
IET Communications
, vol.3
, pp. 846-858
-
-
Maarouf, U.B.1
Naseer, A.R.2
-
54
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Yan S, Wei Y, Zhu H, Ray KRL,. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE JSAC 2006; 24: 305-317.
-
(2006)
IEEE JSAC
, vol.24
, pp. 305-317
-
-
Yan, S.1
Wei, Y.2
Zhu, H.3
Ray, K.R.L.4
-
56
-
-
79952097418
-
A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory
-
Feng R, Xu X, Zhou X, Wan J,. A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory. Sensors 2011; 11: 1345-1360.
-
(2011)
Sensors
, vol.11
, pp. 1345-1360
-
-
Feng, R.1
Xu, X.2
Zhou, X.3
Wan, J.4
-
58
-
-
78249273664
-
Linguistic fuzzy logic enhancement of trust mechanism for distributed networks
-
Bradford, West Yorkshire, UK
-
Flix GM, Javier G, Marn B, Gregorio MP,. Linguistic fuzzy logic enhancement of trust mechanism for distributed networks, In Proceedings of International Conference on Computer and Information Technology, Bradford, West Yorkshire, UK, 2010; 838-845.
-
(2010)
Proceedings of International Conference on Computer and Information Technology
, pp. 838-845
-
-
Flix, G.M.1
Javier, G.2
Marn, B.3
Gregorio, M.P.4
-
59
-
-
78651556986
-
Trust evaluation and dynamic routing decision based on fuzzy theory for MANETs
-
Hongjun D, Zhiping J, Zhiwei Q,. Trust evaluation and dynamic routing decision based on fuzzy theory for MANETs. Journal of Software 2009; 4: 1091-1101.
-
(2009)
Journal of Software
, vol.4
, pp. 1091-1101
-
-
Hongjun, D.1
Zhiping, J.2
Zhiwei, Q.3
-
60
-
-
79251588431
-
Expert security system in wireless sensor networks based on fuzzy discussion multi-agent system
-
Shahaboddin Sh, Samira K, Zeinab SD, Liang SN,. Expert security system in wireless sensor networks based on fuzzy discussion multi-agent system. Scientific Research and Essays 2010; 5: 3840-3849.
-
(2010)
Scientific Research and Essays
, vol.5
, pp. 3840-3849
-
-
Shahaboddin, S.1
Samira, K.2
Zeinab, S.D.3
Liang, S.N.4
-
62
-
-
77949974817
-
PLUS: Parameterised localised trust management-based security framework for sensor networks
-
Zhiying Y, Ki D, Do YM,. PLUS: parameterised localised trust management-based security framework for sensor networks. International Journal of Sensor Networks 2008; 3: 224-236.
-
(2008)
International Journal of Sensor Networks
, vol.3
, pp. 224-236
-
-
Zhiying, Y.1
Ki, D.2
Do, Y.M.3
-
63
-
-
78651550185
-
Power-aware and reliable sensor selection based on trust for wireless sensor networks
-
Han G, Lei S, Ma J, Park JH, Ni J,. Power-aware and reliable sensor selection based on trust for wireless sensor networks. Journal of Communications 2010; 5: 23-30.
-
(2010)
Journal of Communications
, vol.5
, pp. 23-30
-
-
Han, G.1
Lei, S.2
Ma, J.3
Park, J.H.4
Ni, J.5
-
64
-
-
33745820773
-
Trust management for resilient wireless sensor networks
-
Junbeom H, Lee YH, Hong SM, Yoon HS,. Trust management for resilient wireless sensor networks. Lecture Notes in Computer Science 2006; 3935: 56-68.
-
(2006)
Lecture Notes in Computer Science
, vol.3935
, pp. 56-68
-
-
Junbeom, H.1
Lee, Y.H.2
Hong, S.M.3
Yoon, H.S.4
-
66
-
-
80052171869
-
Trust-based intrusion detection in wireless sensor networks
-
Kyoto, Japan
-
Fenye B, Ing-Ray Ch, Moon JC, Jin-Hee Cho,. Trust-based intrusion detection in wireless sensor networks, In IEEE Communications (ICC), Kyoto, Japan, 2011; 1-6.
-
(2011)
IEEE Communications (ICC)
, pp. 1-6
-
-
Fenye, B.1
Ing-Ray, C.2
Moon, J.C.3
Jin-Hee, C.4
-
68
-
-
84862154822
-
Statistical trust establishment in WSNs
-
Hsinchu, Taiwan
-
Probst MJ, Kasera SK,. Statistical trust establishment in WSNs, In Proceedings of Parallel and Distributed Systems, International Conference, Hsinchu, Taiwan, 2007; 1-8.
-
(2007)
Proceedings of Parallel and Distributed Systems, International Conference
, pp. 1-8
-
-
Probst, M.J.1
Kasera, S.K.2
-
69
-
-
84861040223
-
Trust-based routing mechanism in MANET: Design and implementation
-
Eissa T, Abdul Razak SH, Rashid Kh, Normalia S,. Trust-based routing mechanism in MANET: design and implementation. Mobile Networks and Applications 2011; 16: 1-12.
-
(2011)
Mobile Networks and Applications
, vol.16
, pp. 1-12
-
-
Eissa, T.1
Abdul Razak, S.H.2
Rashid, K.3
Normalia, S.4
-
70
-
-
84864242377
-
Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks
-
San Francisco, CA, USA
-
Cho Y, Qu G, Wu Y,. Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks, In IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 2012; 134-141.
-
(2012)
IEEE Security and Privacy Workshops (SPW)
, pp. 134-141
-
-
Cho, Y.1
Qu, G.2
Wu, Y.3
|