메뉴 건너뛰기




Volumn 33, Issue , 2015, Pages 154-167

Hierarchical trust management of community of interest groups in mobile ad hoc networks

Author keywords

Community of interest groups; Hierarchical trust management; Intrusion detection

Indexed keywords

INTRUSION DETECTION;

EID: 84941876279     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2015.05.004     Document Type: Article
Times cited : (24)

References (41)
  • 2
    • 45749109010 scopus 로고    scopus 로고
    • SybilGuard: Defending against sybil attacks via social networks
    • H. Yu, M. Kaminsky, P.B. Gibbons, and A.D. Flaxman SybilGuard: defending against sybil attacks via social networks IEEE/ACM Trans. Netw. 16 3 2008 576 589
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.3 , pp. 576-589
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.D.4
  • 4
    • 63049119529 scopus 로고    scopus 로고
    • Social network analysis for information flow in disconnected delay-tolerant MANETs
    • E.M. Daly, and M. Haahr Social network analysis for information flow in disconnected delay-tolerant MANETs IEEE Trans. Mob. Comput. 8 5 2009 606 621
    • (2009) IEEE Trans. Mob. Comput. , vol.8 , Issue.5 , pp. 606-621
    • Daly, E.M.1    Haahr, M.2
  • 6
    • 77953319755 scopus 로고    scopus 로고
    • Routing in socially selfish delay tolerant networks
    • San Diego, CA
    • Q. Li, S. Zhu, G. Cao, Routing in socially selfish delay tolerant networks, in: IEEE Conference on Computer Communications, San Diego, CA, 2010, pp. 1-9.
    • (2010) IEEE Conference on Computer Communications , pp. 1-9
    • Li, Q.1    Zhu, S.2    Cao, G.3
  • 8
    • 40849124634 scopus 로고    scopus 로고
    • Performance optimization of region-based group key management in mobile ad hoc networks
    • J.H. Cho, I.R. Chen, and D.C. Wang Performance optimization of region-based group key management in mobile ad hoc networks Perform. Eval. 65 5 2008 319 344
    • (2008) Perform. Eval. , vol.65 , Issue.5 , pp. 319-344
    • Cho, J.H.1    Chen, I.R.2    Wang, D.C.3
  • 9
    • 70749147824 scopus 로고    scopus 로고
    • Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks
    • Vancouver, Canada
    • J.H. Cho, A. Swami, I.R. Chen, Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks, in: International Conference on Computational Science and Engineering, Vancouver, Canada, 2009.
    • (2009) International Conference on Computational Science and Engineering
    • Cho, J.H.1    Swami, A.2    Chen, I.R.3
  • 10
    • 84857844113 scopus 로고    scopus 로고
    • A Survey on trust management for mobile ad hoc networks
    • J.H. Cho, A. Swami, and I.R. Chen A Survey on trust management for mobile ad hoc networks IEEE Commun. Surv. Tut. 13 4 2011 562 583
    • (2011) IEEE Commun. Surv. Tut. , vol.13 , Issue.4 , pp. 562-583
    • Cho, J.H.1    Swami, A.2    Chen, I.R.3
  • 12
    • 78649633783 scopus 로고    scopus 로고
    • Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks
    • J.H. Cho, and I.R. Chen Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks Perform. Eval. 68 1 2011 58 75
    • (2011) Perform. Eval. , vol.68 , Issue.1 , pp. 58-75
    • Cho, J.H.1    Chen, I.R.2
  • 14
    • 84862138560 scopus 로고    scopus 로고
    • Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
    • F. Bao, I.R. Chen, M. Chang, and J.H. Cho Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection IEEE Trans. Netw. Serv. Manage. 9 2 2012 161 183
    • (2012) IEEE Trans. Netw. Serv. Manage. , vol.9 , Issue.2 , pp. 161-183
    • Bao, F.1    Chen, I.R.2    Chang, M.3    Cho, J.H.4
  • 15
    • 84874959990 scopus 로고    scopus 로고
    • Effect of intrusion detection and response on reliability of cyber physical systems
    • R. Mitchell, and I.R. Chen Effect of intrusion detection and response on reliability of cyber physical systems IEEE Trans. Reliab. 62 1 2013 199 210
    • (2013) IEEE Trans. Reliab. , vol.62 , Issue.1 , pp. 199-210
    • Mitchell, R.1    Chen, I.R.2
  • 17
    • 29844435578 scopus 로고    scopus 로고
    • A localized trust management scheme for ad hoc networks
    • C.R. Davis, A localized trust management scheme for ad hoc networks, in: International Conference on Networking, 2004, pp. 671-675.
    • (2004) International Conference on Networking , pp. 671-675
    • Davis, C.R.1
  • 18
    • 84941875225 scopus 로고    scopus 로고
    • The ns-3 Network Simulator
    • The ns-3 Network Simulator, 2011, < http://www.nsnam.org/ >.
    • (2011)
  • 19
    • 84878297450 scopus 로고    scopus 로고
    • LDTS: A lightweight and dependable trust system for clustered wireless sensor networks
    • X. Li, F. Zhou, and J. Du LDTS: a lightweight and dependable trust system for clustered wireless sensor networks IEEE Trans. Inf. Foren. Secur. 8 6 2013 924 935
    • (2013) IEEE Trans. Inf. Foren. Secur. , vol.8 , Issue.6 , pp. 924-935
    • Li, X.1    Zhou, F.2    Du, J.3
  • 20
    • 84858050885 scopus 로고    scopus 로고
    • Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
    • J.H. Cho, A. Swami, and I.R. Chen Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks Netw. Comput. Appl. 35 2012 1001 1012
    • (2012) Netw. Comput. Appl. , vol.35 , pp. 1001-1012
    • Cho, J.H.1    Swami, A.2    Chen, I.R.3
  • 21
    • 84900637145 scopus 로고    scopus 로고
    • A survey of intrusion detection in wireless networks
    • R. Mitchell, and I.R. Chen A survey of intrusion detection in wireless networks Comput. Commun. 42 2014 1 23
    • (2014) Comput. Commun. , vol.42 , pp. 1-23
    • Mitchell, R.1    Chen, I.R.2
  • 25
    • 79955045996 scopus 로고    scopus 로고
    • A trust management architecture for hierarchical wireless sensor networks
    • Denver, Colorado
    • J. Zhang, et al., A trust management architecture for hierarchical wireless sensor networks, in: 35th IEEE International Conference on Local Computer Networks, Denver, Colorado, 2010, pp. 264-267.
    • (2010) 35th IEEE International Conference on Local Computer Networks , pp. 264-267
    • Zhang, J.1
  • 26
    • 4944220325 scopus 로고    scopus 로고
    • The beta reputation system
    • Bled, Slovenia
    • A. Jøsang, R. Ismail, The beta reputation system, in: Bled Electronic Commerce Conference, Bled, Slovenia, 2002, pp. 1-14.
    • (2002) Bled Electronic Commerce Conference , pp. 1-14
    • Jøsang, A.1
  • 27
    • 85008532916 scopus 로고    scopus 로고
    • An iterative algorithm for trust management and adversary detection for delay tolerant networks
    • E. Ayday, H. Lee, and F. Fekri An iterative algorithm for trust management and adversary detection for delay tolerant networks IEEE Trans. Mob. Comput. 11 9 2012 1514 1531
    • (2012) IEEE Trans. Mob. Comput. , vol.11 , Issue.9 , pp. 1514-1531
    • Ayday, E.1    Lee, H.2    Fekri, F.3
  • 28
    • 84941344581 scopus 로고    scopus 로고
    • Simulation study of a class of autonomous host-centric mobility prediction algorithms for wireless cellular and ad hoc networks
    • I.R. Chen, N. Verma, Simulation study of a class of autonomous host-centric mobility prediction algorithms for wireless cellular and ad hoc networks, in: 36th Annual Symposium on Simulation, 2003, pp. 65-72.
    • (2003) 36th Annual Symposium on Simulation , pp. 65-72
    • Chen, I.R.1    Verma, N.2
  • 29
    • 78751676469 scopus 로고    scopus 로고
    • Adaptive fault-tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks
    • I.R. Chen, A.P. Speer, and M. Eltoweissy Adaptive fault-tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks IEEE Trans. Dependable Secure Comput. 8 2 2011 161 176
    • (2011) IEEE Trans. Dependable Secure Comput. , vol.8 , Issue.2 , pp. 161-176
    • Chen, I.R.1    Speer, A.P.2    Eltoweissy, M.3
  • 30
    • 84879051898 scopus 로고    scopus 로고
    • Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks
    • H. Al-Hamadi, and I.R. Chen Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks IEEE Trans. Netw. Serv. Manage. 19 2 2013 189 203
    • (2013) IEEE Trans. Netw. Serv. Manage. , vol.19 , Issue.2 , pp. 189-203
    • Al-Hamadi, H.1    Chen, I.R.2
  • 32
    • 33746659142 scopus 로고    scopus 로고
    • Admission control algorithms for revenue optimization with QoS guarantees in mobile wireless networks
    • I.R. Chen, O. Yilmaz, and I.L. Yen Admission control algorithms for revenue optimization with QoS guarantees in mobile wireless networks Wireless Pers. Commun. 38 3 2006 357 376
    • (2006) Wireless Pers. Commun. , vol.38 , Issue.3 , pp. 357-376
    • Chen, I.R.1    Yilmaz, O.2    Yen, I.L.3
  • 33
    • 0037645949 scopus 로고    scopus 로고
    • Dynamic quota-based admission control with sub-rating in multimedia servers
    • S.T. Cheng, C.M. Chen, and I.R. Chen Dynamic quota-based admission control with sub-rating in multimedia servers Multimedia Syst. 8 2 2000 83 91
    • (2000) Multimedia Syst. , vol.8 , Issue.2 , pp. 83-91
    • Cheng, S.T.1    Chen, C.M.2    Chen, I.R.3
  • 34
    • 0032309753 scopus 로고    scopus 로고
    • Performance evaluation of forwarding strategies for location management in mobile networks
    • I.R. Chen, T.M. Chen, and C. Lee Performance evaluation of forwarding strategies for location management in mobile networks Comput. J. 41 4 1998 243 253
    • (1998) Comput. J. , vol.41 , Issue.4 , pp. 243-253
    • Chen, I.R.1    Chen, T.M.2    Lee, C.3
  • 35
    • 20844443098 scopus 로고    scopus 로고
    • Performance analysis of location-aware mobile service proxies for reducing network cost in personal communication systems
    • B. Gu, and I.R. Chen Performance analysis of location-aware mobile service proxies for reducing network cost in personal communication systems Mob. Netw. Appl. 10 4 2005 453 463
    • (2005) Mob. Netw. Appl. , vol.10 , Issue.4 , pp. 453-463
    • Gu, B.1    Chen, I.R.2
  • 36
    • 84874953401 scopus 로고    scopus 로고
    • A reputation-based trust management system for P2P networks
    • A.A. Selçuk, E. Uzun, and M.R. Pariente A reputation-based trust management system for P2P networks Netw. Secur. 6 3 2008 235 245
    • (2008) Netw. Secur. , vol.6 , Issue.3 , pp. 235-245
    • Selçuk, A.A.1    Uzun, E.2    Pariente, M.R.3
  • 37
    • 3142738238 scopus 로고    scopus 로고
    • PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities
    • L. Xiong, and L. Liu PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities IEEE Trans. Knowl. Data Eng. 16 2004 843 857
    • (2004) IEEE Trans. Knowl. Data Eng. , vol.16 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 39
    • 84891957204 scopus 로고    scopus 로고
    • ServiceTrust: Trust management in service provision networks
    • Santa Clara, CA
    • Z. Su, et al., ServiceTrust: trust management in service provision networks, in: IEEE International Conference on Services Computing, Santa Clara, CA, 2013.
    • (2013) IEEE International Conference on Services Computing
    • Su, Z.1
  • 40
    • 84896101663 scopus 로고    scopus 로고
    • Dynamic trust management for delay tolerant networks and its application to secure routing
    • I.R. Chen, F. Bao, M. Chang, and J.H. Cho Dynamic trust management for delay tolerant networks and its application to secure routing IEEE Trans. Parallel Distrib. Syst. 25 5 2014 1200 1210
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.5 , pp. 1200-1210
    • Chen, I.R.1    Bao, F.2    Chang, M.3    Cho, J.H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.