-
1
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz, I.F., Weilian, S., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Weilian, S.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
55749099619
-
On handling insider attacks in wireless sensor networks
-
Krau, C., Schneider, M., Eckert, C.: On handling insider attacks in wireless sensor networks. Information Security Technical Report 13(3), 165–172 (2008)
-
(2008)
Information Security Technical Report
, vol.13
, Issue.3
, pp. 165-172
-
-
Krau, C.1
Schneider, M.2
Eckert, C.3
-
3
-
-
84891933258
-
Management and applications of trust in Wireless Sensor Networks: A survey
-
Han, G., Jiang, J., Shu, L., Niu, J., Chao, H.C.: Management and applications of trust in Wireless Sensor Networks: A survey. Journal of Computer and System Sciences 80(3), 602–617 (2014)
-
(2014)
Journal of Computer and System Sciences
, vol.80
, Issue.3
, pp. 602-617
-
-
Han, G.1
Jiang, J.2
Shu, L.3
Niu, J.4
Chao, H.C.5
-
4
-
-
84888005631
-
Reactive and adaptive monitoring to secure aggregation in wireless sensor networks
-
Labraoui, N., Gueroui, M., Aliouat, M., Petit, J.: Reactive and adaptive monitoring to secure aggregation in wireless sensor networks. Telecommunication Systems 54(1), 3–17 (2013)
-
(2013)
Telecommunication Systems
, vol.54
, Issue.1
, pp. 3-17
-
-
Labraoui, N.1
Gueroui, M.2
Aliouat, M.3
Petit, J.4
-
5
-
-
56949106800
-
A trust-based security system for ubiquitous and pervasive computing environments
-
Boukerche, A., Ren, Y.: A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications 31, 4343–4351 (2008)
-
(2008)
Computer Communications
, vol.31
, pp. 4343-4351
-
-
Boukerche, A.1
Ren, Y.2
-
6
-
-
79551566748
-
Providing trust in wireless sensor networks using a bioinspired technique
-
Mármol, F.G., Pérez, G.M.: Providing trust in wireless sensor networks using a bioinspired technique. Telecommunication Systems 46(2), 163–180 (2010)
-
(2010)
Telecommunication Systems
, vol.46
, Issue.2
, pp. 163-180
-
-
Mármol, F.G.1
Pérez, G.M.2
-
7
-
-
77950866308
-
Trust management systems for wireless sensor networks: Best Practices
-
Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: Best Practices. Computer Communications 33(9), 1086–1093 (2010)
-
(2010)
Computer Communications
, vol.33
, Issue.9
, pp. 1086-1093
-
-
Lopez, J.1
Roman, R.2
Agudo, I.3
Fernandez-Gago, C.4
-
8
-
-
84978970998
-
Reputationbased trust systems for wireless sensor networks: A comprehensive review
-
In: Fernández- Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.), Springer, Heidelberg
-
Alzaid, H., Alfaraj, M., Ries, S., Jøsang, A., Albabtain, M., Abuhaimed, A.: Reputationbased trust systems for wireless sensor networks: A comprehensive review. In: Fernández- Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) Trust Management VII. IFIP AICT, vol. 401, pp. 66–82. Springer, Heidelberg (2013)
-
(2013)
Trust Management VII. IFIP AICT
, vol.401
, pp. 66-82
-
-
Alzaid, H.1
Alfaraj, M.2
Ries, S.3
Jøsang, A.4
Albabtain, M.5
Abuhaimed, A.6
-
11
-
-
70350070568
-
Group-based trust management scheme for clustered wireless sensor networks
-
Shaikh, R.A., Jameel, H., d’Auriol, B.J., Lee, H., Lee, S., Song, Y.J.: Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 20(11), 1698–1712 (2009)
-
(2009)
IEEE Transactions on Parallel and Distributed Systems
, vol.20
, Issue.11
, pp. 1698-1712
-
-
Shaikh, R.A.1
Jameel, H.2
D’Auriol, B.J.3
Lee, H.4
Lee, S.5
Song, Y.J.6
-
12
-
-
84863512174
-
ReTrust: Attack-resistant and lightweight trust management for medical sensor networks
-
Daojing, H., Chun, C., Chan, S., Bu, J., Vasilakos, A.V.: ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedecine 16(4), 623–632 (2012)
-
(2012)
IEEE Transactions on Information Technology in Biomedecine
, vol.16
, Issue.4
, pp. 623-632
-
-
Daojing, H.1
Chun, C.2
Chan, S.3
Bu, J.4
Vasilakos, A.V.5
-
13
-
-
36148956575
-
Analysis of recommendations on trust inference in open environment
-
Liang, Z., Shi, W.: Analysis of recommendations on trust inference in open environment. Performance Evaluation 65(2), 99–128 (2008)
-
(2008)
Performance Evaluation
, vol.65
, Issue.2
, pp. 99-128
-
-
Liang, Z.1
Shi, W.2
-
14
-
-
77956948315
-
Survey of trust and reputation management systems in wireless communications
-
Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: Survey of trust and reputation management systems in wireless communications. Proceeding of IEEE 98(10), 1755–1772 (2010)
-
(2010)
Proceeding of IEEE
, vol.98
, Issue.10
, pp. 1755-1772
-
-
Yu, H.1
Shen, Z.2
Miao, C.3
Leung, C.4
Niyato, D.5
-
15
-
-
80052171869
-
Trust-Based Intrusion Detection in Wireless Sensor Networks
-
Bao, F., Chen, I.R., Chang, M.J., Cho, J.: Trust-Based Intrusion Detection in Wireless Sensor Networks. In: Proceedings of IEEE International Conference on Communications (ICC), pp. 1–6 (2011)
-
(2011)
Proceedings of IEEE International Conference on Communications (ICC)
, pp. 1-6
-
-
Bao, F.1
Chen, I.R.2
Chang, M.J.3
Cho, J.4
-
16
-
-
56749140937
-
Defense of Trust management vulnerabilities in distributed networks
-
Sun, Y.L., Zhu, H., Liu, K.J.R.: Defense of Trust management vulnerabilities in distributed networks. IEEE Communication Magazine 46, 112–119 (2008)
-
(2008)
IEEE Communication Magazine
, vol.46
, pp. 112-119
-
-
Sun, Y.L.1
Zhu, H.2
Liu, K.3
|