메뉴 건너뛰기




Volumn 456, Issue , 2015, Pages 406-415

On-off attacks mitigation against trust systems in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; NETWORK SECURITY; SENSOR NODES;

EID: 84931056000     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-319-19578-0_33     Document Type: Conference Paper
Times cited : (25)

References (16)
  • 3
    • 84891933258 scopus 로고    scopus 로고
    • Management and applications of trust in Wireless Sensor Networks: A survey
    • Han, G., Jiang, J., Shu, L., Niu, J., Chao, H.C.: Management and applications of trust in Wireless Sensor Networks: A survey. Journal of Computer and System Sciences 80(3), 602–617 (2014)
    • (2014) Journal of Computer and System Sciences , vol.80 , Issue.3 , pp. 602-617
    • Han, G.1    Jiang, J.2    Shu, L.3    Niu, J.4    Chao, H.C.5
  • 4
    • 84888005631 scopus 로고    scopus 로고
    • Reactive and adaptive monitoring to secure aggregation in wireless sensor networks
    • Labraoui, N., Gueroui, M., Aliouat, M., Petit, J.: Reactive and adaptive monitoring to secure aggregation in wireless sensor networks. Telecommunication Systems 54(1), 3–17 (2013)
    • (2013) Telecommunication Systems , vol.54 , Issue.1 , pp. 3-17
    • Labraoui, N.1    Gueroui, M.2    Aliouat, M.3    Petit, J.4
  • 5
    • 56949106800 scopus 로고    scopus 로고
    • A trust-based security system for ubiquitous and pervasive computing environments
    • Boukerche, A., Ren, Y.: A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications 31, 4343–4351 (2008)
    • (2008) Computer Communications , vol.31 , pp. 4343-4351
    • Boukerche, A.1    Ren, Y.2
  • 6
    • 79551566748 scopus 로고    scopus 로고
    • Providing trust in wireless sensor networks using a bioinspired technique
    • Mármol, F.G., Pérez, G.M.: Providing trust in wireless sensor networks using a bioinspired technique. Telecommunication Systems 46(2), 163–180 (2010)
    • (2010) Telecommunication Systems , vol.46 , Issue.2 , pp. 163-180
    • Mármol, F.G.1    Pérez, G.M.2
  • 7
    • 77950866308 scopus 로고    scopus 로고
    • Trust management systems for wireless sensor networks: Best Practices
    • Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: Best Practices. Computer Communications 33(9), 1086–1093 (2010)
    • (2010) Computer Communications , vol.33 , Issue.9 , pp. 1086-1093
    • Lopez, J.1    Roman, R.2    Agudo, I.3    Fernandez-Gago, C.4
  • 8
    • 84978970998 scopus 로고    scopus 로고
    • Reputationbased trust systems for wireless sensor networks: A comprehensive review
    • In: Fernández- Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.), Springer, Heidelberg
    • Alzaid, H., Alfaraj, M., Ries, S., Jøsang, A., Albabtain, M., Abuhaimed, A.: Reputationbased trust systems for wireless sensor networks: A comprehensive review. In: Fernández- Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) Trust Management VII. IFIP AICT, vol. 401, pp. 66–82. Springer, Heidelberg (2013)
    • (2013) Trust Management VII. IFIP AICT , vol.401 , pp. 66-82
    • Alzaid, H.1    Alfaraj, M.2    Ries, S.3    Jøsang, A.4    Albabtain, M.5    Abuhaimed, A.6
  • 10
  • 13
    • 36148956575 scopus 로고    scopus 로고
    • Analysis of recommendations on trust inference in open environment
    • Liang, Z., Shi, W.: Analysis of recommendations on trust inference in open environment. Performance Evaluation 65(2), 99–128 (2008)
    • (2008) Performance Evaluation , vol.65 , Issue.2 , pp. 99-128
    • Liang, Z.1    Shi, W.2
  • 14
    • 77956948315 scopus 로고    scopus 로고
    • Survey of trust and reputation management systems in wireless communications
    • Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: Survey of trust and reputation management systems in wireless communications. Proceeding of IEEE 98(10), 1755–1772 (2010)
    • (2010) Proceeding of IEEE , vol.98 , Issue.10 , pp. 1755-1772
    • Yu, H.1    Shen, Z.2    Miao, C.3    Leung, C.4    Niyato, D.5
  • 16
    • 56749140937 scopus 로고    scopus 로고
    • Defense of Trust management vulnerabilities in distributed networks
    • Sun, Y.L., Zhu, H., Liu, K.J.R.: Defense of Trust management vulnerabilities in distributed networks. IEEE Communication Magazine 46, 112–119 (2008)
    • (2008) IEEE Communication Magazine , vol.46 , pp. 112-119
    • Sun, Y.L.1    Zhu, H.2    Liu, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.