-
1
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Hu, Y.-C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1), 175–192. doi:10.1016/S1570-8705(03)00019-2.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
2
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Hu, Y.-C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1–2), 21–38. doi:10.1007/s11276-004-4744-y.
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
3
-
-
84887125774
-
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
-
Lai, C., Li, H., Lu, R., & Shen, X. S. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510. doi:10.1002/ett.2635.
-
(2013)
Computer Networks
, vol.57
, Issue.17
, pp. 3492-3510
-
-
Lai, C.1
Li, H.2
Lu, R.3
Shen, X.S.4
-
4
-
-
80055081667
-
Survey of trust Models in different network domains
-
Momani, M., & Challa, S. (2010). Survey of trust Models in different network domains. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 1(3), 1–19.
-
(2010)
International Journal of Ad hoc, Sensor & Ubiquitous Computing
, vol.1
, Issue.3
, pp. 1-19
-
-
Momani, M.1
Challa, S.2
-
5
-
-
62949130774
-
Two-factor user Authentication in Wireless Sensor Networks
-
Das, M. L. (2009). Two-factor user Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
6
-
-
84893163837
-
TSRF: A trust-aware secure routing framework in wireless sensor networks
-
Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, 1–14. doi:10.1155/2014/209436.
-
(2014)
International Journal of Distributed Sensor Networks
, vol.2014
, pp. 1-14
-
-
Duan, J.1
Yang, D.2
Zhu, H.3
Zhang, S.4
Zhao, J.5
-
7
-
-
39149127588
-
Cryptographic versus trust-based methods for MANET routing security
-
Cordasco, J., & Wetzel, S. (2008). Cryptographic versus trust-based methods for MANET routing security. Electronic Notes in Theoretical Computer Science, 197(2), 131–140. doi:10.1016/j.entcs.2007.12.022.
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.197
, Issue.2
, pp. 131-140
-
-
Cordasco, J.1
Wetzel, S.2
-
8
-
-
84861334371
-
Trust computations and trust dynamics in mobile adhoc networks: A survey
-
Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298. doi:10.1109/SURV.2011.042711.00083.
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.14
, Issue.2
, pp. 279-298
-
-
Govindan, K.1
Mohapatra, P.2
-
9
-
-
84928666537
-
Trust management system in wireless sensor networks: Design considerations and research challenges
-
Ishmanov, F., Malik, A. S., Kim, S. W., & Begalov, B. (2013). Trust management system in wireless sensor networks: Design considerations and research challenges. Transactions on Emerging Telecommunications Technologies, pp. 1–24. doi:10.1002/ett.2674.
-
(2013)
Transactions on Emerging Telecommunications Technologies
, pp. 1-24
-
-
Ishmanov, F.1
Malik, A.S.2
Kim, S.W.3
Begalov, B.4
-
10
-
-
84858038684
-
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
-
Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880. doi:10.1016/j.jnca.2011.03.005.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.3
, pp. 867-880
-
-
Yu, Y.1
Li, K.2
Zhou, W.3
Li, P.4
-
11
-
-
47649105404
-
A survey on the applicability of trust management systems for wireless sensor networks. In Third
-
Fernandez-Gago, M. C., Roman, R., & Lopez, J. (2007). A survey on the applicability of trust management systems for wireless sensor networks. In Third IEEE International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU (pp. 25–30).
-
(2007)
IEEE International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU
, pp. 25-30
-
-
Fernandez-Gago, M.C.1
Roman, R.2
Lopez, J.3
-
13
-
-
62249218320
-
Quick local repair scheme using adaptive promiscuous mode in mobile ad hoc networks
-
Youn, J. (2006). Quick local repair scheme using adaptive promiscuous mode in mobile ad hoc networks. Journal of Networks, 1(1), 1–11.
-
(2006)
Journal of Networks
, vol.1
, Issue.1
, pp. 1-11
-
-
Youn, J.1
-
14
-
-
78651437041
-
An improved route maintenance strategy for QoS based AODV routing protocol
-
Roy, B., Banik, S., Chaki, N., & Saha, B. (2010). An improved route maintenance strategy for QoS based AODV routing protocol. International Conference on Advances in Recent Technologies in Communication and Computing, pp. 51–55. doi:10.1109/ARTCom.2010.62.
-
(2010)
International Conference on Advances in Recent Technologies in Communication and Computing
, pp. 51-55
-
-
Roy, B.1
Banik, S.2
Chaki, N.3
Saha, B.4
-
16
-
-
84904665056
-
A light-weight trust-based QoS routing algorithm for ad hoc networks
-
Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180. doi:10.1016/j.pmcj.2013.06.004.
-
(2014)
Pervasive and Mobile Computing
, vol.13
, pp. 164-180
-
-
Wang, B.1
Chen, X.2
Chang, W.3
-
17
-
-
84885310593
-
TC-BAC: A trust and centrality degree based access control model in wireless sensor networks
-
Duan, J., Gao, D., Foh, C. H., & Zhang, H. (2013). TC-BAC: A trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Networks, 11(8), 2675–2692. doi:10.1016/j.adhoc.2013.05.005.
-
(2013)
Ad Hoc Networks
, vol.11
, Issue.8
, pp. 2675-2692
-
-
Duan, J.1
Gao, D.2
Foh, C.H.3
Zhang, H.4
-
18
-
-
84893499151
-
Light-weight trust-based on-demand multipath routing protocol for mobile ad hoc networks. In 12th IEEE International Conference on Trust
-
Qu, C., Ju, L., Jia, Z., Xu, H., & Zheng, L. (2013). Light-weight trust-based on-demand multipath routing protocol for mobile ad hoc networks. In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 42–49). doi:10.1109/TrustCom.2013.9.
-
(2013)
Security and Privacy in Computing and Communications
, pp. 42-49
-
-
Qu, C.1
Ju, L.2
Jia, Z.3
Xu, H.4
Zheng, L.5
-
19
-
-
84864659174
-
Combining trust with location information for routing in wireless sensor networks
-
Leligou, H. C., Trakadas, P., Maniatis, S., Karkazis, P., & Zahariadis, T. (2012). Combining trust with location information for routing in wireless sensor networks. Wireless Communications and Mobile Computing, 12(12), 1091–1103. doi:10.1002/wcm.1038.
-
(2012)
Wireless Communications and Mobile Computing
, vol.12
, Issue.12
, pp. 1091-1103
-
-
Leligou, H.C.1
Trakadas, P.2
Maniatis, S.3
Karkazis, P.4
Zahariadis, T.5
-
20
-
-
84866593866
-
A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks
-
Sun, Y., Luo, H., & Das, S. K. (2012). A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Transactions on Dependable and Secure Computing, 9(6), 785–797.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.6
, pp. 785-797
-
-
Sun, Y.1
Luo, H.2
Das, S.K.3
-
21
-
-
84864767821
-
Dealing with dishonest recommendation: The trials in reputation management court
-
Chen, S., Zhang, Y., Liu, Q., & Feng, J. (2012). Dealing with dishonest recommendation: The trials in reputation management court. Ad Hoc Networks, 10(8), 1603–1618. doi:10.1016/j.adhoc.2011.07.014.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.8
, pp. 1603-1618
-
-
Chen, S.1
Zhang, Y.2
Liu, Q.3
Feng, J.4
-
22
-
-
78651566862
-
Trust based outing for misbehavior detection in ad hoc networks
-
Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., & Lam, K.-Y. (2010). Trust based outing for misbehavior detection in ad hoc networks. Journal of Networks, 5(5), 551–558. doi:10.4304/jnw.5.5.551-558.
-
(2010)
Journal of Networks
, vol.5
, Issue.5
, pp. 551-558
-
-
Gong, W.1
You, Z.2
Chen, D.3
Zhao, X.4
Gu, M.5
Lam, K.-Y.6
-
23
-
-
84857844113
-
A survey on trust management for mobile ad hoc networks
-
Cho, J., Swami, A., & Chen, I. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.
-
(2011)
IEEE Communications Surveys & Tutorials
, vol.13
, Issue.4
, pp. 562-583
-
-
Cho, J.1
Swami, A.2
Chen, I.3
-
24
-
-
0036980294
-
-
Zapata, M. G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security (pp. 1–10). New York: ACM
-
Zapata, M. G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security (pp. 1–10). New York: ACM.
-
-
-
-
25
-
-
0035789243
-
-
Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware routing protocol for wireless ad-hoc networks. In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (pp. 299–302). New York: ACM
-
Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware routing protocol for wireless ad-hoc networks. In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (pp. 299–302). New York: ACM.
-
-
-
-
26
-
-
84879695642
-
A novel trust-aware geographical routing scheme for wireless sensor networks
-
Zahariadis, T., Trakadas, P., Leligou, H. C., Maniatis, S., & Karkazis, P. (2012). A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 805–826. doi:10.1007/s11277-012-0613-7.
-
(2012)
Wireless Personal Communications
, vol.69
, Issue.2
, pp. 805-826
-
-
Zahariadis, T.1
Trakadas, P.2
Leligou, H.C.3
Maniatis, S.4
Karkazis, P.5
-
27
-
-
84886593344
-
Trust-Based Routing Mechanism in MANET: Design and Implementation
-
Eissa, T., Abdul Razak, S., Khokhar, R. H., & Samian, N. (2013). Trust-Based Routing Mechanism in MANET: Design and Implementation. Mobile Networks and Applications, 18(5), 666–677. doi:10.1007/s11036-011-0328-0.
-
(2013)
Mobile Networks and Applications
, vol.18
, Issue.5
, pp. 666-677
-
-
Eissa, T.1
Abdul Razak, S.2
Khokhar, R.H.3
Samian, N.4
-
28
-
-
84856274467
-
Design and implementation of TARF?: A trust-aware routing framework for WSNs
-
Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF?: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.2
, pp. 184-197
-
-
Zhan, G.1
Shi, W.2
Deng, J.3
-
30
-
-
80053318843
-
A reliable routing scheme for post-disaster ad hoc communication networks
-
Channa, M. I., & Ahmed, K. M. (2011). A reliable routing scheme for post-disaster ad hoc communication networks. Journal of Communications, 6(7), 549–557. doi:10.4304/jcm.6.7.549-557.
-
(2011)
Journal of Communications
, vol.6
, Issue.7
, pp. 549-557
-
-
Channa, M.I.1
Ahmed, K.M.2
-
31
-
-
84863586452
-
Light-weight trust-based routing protocol for mobile ad hoc networks
-
Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security, 6(2), 77–83. doi:10.1049/iet-ifs.2010.0160.
-
(2012)
IET Information Security
, vol.6
, Issue.2
, pp. 77-83
-
-
Marchang, N.1
Datta, R.2
-
33
-
-
77951584764
-
Trust-aware in-network aggregation for wireless sensor networks
-
Deng, H., Jin, G., Sun, K., Xu, R., Lyell, M., & Luke, J. A. (2009). Trust-aware in-network aggregation for wireless sensor networks. In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM) (pp. 1–8).
-
(2009)
In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM)
, pp. 1-8
-
-
Deng, H.1
Jin, G.2
Sun, K.3
Xu, R.4
Lyell, M.5
Luke, J.A.6
-
34
-
-
0034541756
-
-
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255–265). New York: ACM
-
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255–265). New York: ACM. doi:10.1145/345910.345955.
-
-
-
-
35
-
-
84953370856
-
-
Josang, A., & Ismail, R. (2002). The beta reputation system. In 15th Bled Electronic Commerce Conference (pp. 324–337). Bled Slovenia
-
Josang, A., & Ismail, R. (2002). The beta reputation system. In 15th Bled Electronic Commerce Conference (pp. 324–337). Bled Slovenia.
-
-
-
-
36
-
-
84876783129
-
Comparative study of trust and reputation systems for wireless sensor networks
-
Khalid, O., Khan, S. U., Madani, S. A., Hayat, K., Khan, M. I., Min-Allah, N., et al. (2013). Comparative study of trust and reputation systems for wireless sensor networks. Security and Communication Networks, 6(6), 669–688. doi:10.1002/sec.
-
(2013)
Security and Communication Networks
, vol.6
, Issue.6
, pp. 669-688
-
-
Khalid, O.1
Khan, S.U.2
Madani, S.A.3
Hayat, K.4
Khan, M.I.5
Min-Allah, N.6
Chen, D.7
-
37
-
-
84866262114
-
-
Rahman, A., & Anwar, S. (2012). Enhanced QLRS-APM?: A New proposal ad hoc networks. In Recent Advances in Computer Science and Information Engineering (pp. 91–99). Springer
-
Rahman, A., & Anwar, S. (2012). Enhanced QLRS-APM?: A New proposal ad hoc networks. In Recent Advances in Computer Science and Information Engineering (pp. 91–99). Springer.
-
-
-
-
38
-
-
33947517509
-
Hop-by-hop congestion control over a wireless multi-hop network
-
Yi, Y., & Shakkottai, S. (2007). Hop-by-hop congestion control over a wireless multi-hop network. IEEE/ACM Transactions on Networking, 15(1), 133–144.
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.1
, pp. 133-144
-
-
Yi, Y.1
Shakkottai, S.2
|