-
2
-
-
33646918331
-
Evaluation of Security Mechanisms in Wireless Sensor Networks
-
Montreal, Canada
-
Guimarães, G., Souto, E., Sadok, D.F.H., Kelner, J.: Evaluation of Security Mechanisms in Wireless Sensor Networks. In: Proceedings of the International Conference on Wireless Technologies/High Speed Networks/Multimedia Communications Systems/Sensor Networks, ICW/ICHSN/ICMCS/SENET, Montreal, Canada, pp. 428–433 (2005)
-
(2005)
Proceedings of the International Conference on Wireless Technologies/High Speed Networks/Multimedia Communications Systems/Sensor Networks, ICW/ICHSN/ICMCS/SENET
, pp. 428-433
-
-
Guimarães, G.1
Souto, E.2
Sadok, D.F.H.3
Kelner, J.4
-
3
-
-
33745639957
-
-
Technical Report, CU-CS-990-05. University of Colorado at Boulder - Department of Computer Science
-
Hartung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems. Technical Report, CU-CS-990-05. University of Colorado at Boulder - Department of Computer Science (2005)
-
(2005)
Node Compromise in Sensor Networks: The Need for Secure Systems
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
5
-
-
0002336395
-
Trust as a Commodity
-
Gambetta, D. (ed.), 3rd edn., Basil Blackwell Publishing Ltd., Oxford
-
Dasgupta, P.: Trust as a Commodity. In: Gambetta, D. (ed.) Trust Making and Breaking Cooperative Relations, 3rd edn., pp. 49–72. Basil Blackwell Publishing Ltd., Oxford (2000)
-
(2000)
Trust Making and Breaking Cooperative Relations
, pp. 49-72
-
-
Dasgupta, P.1
-
6
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
7
-
-
0141975217
-
Experimental games for the design of reputation management systems
-
Keser, C.: Experimental games for the design of reputation management systems. IBM Systems Journal 42(3), 498–506 (2003)
-
(2003)
IBM Systems Journal
, vol.42
, Issue.3
, pp. 498-506
-
-
Keser, C.1
-
9
-
-
33646717327
-
-
Ph.D. dissertation, College Park, MD, USA (2005), The thesis is retrieved May 24
-
Golbeck, J.A.: Computing and applying trust in web-based social networks. Ph.D. dissertation, College Park, MD, USA (2005), The thesis is retrieved May 24, 2012
-
(2012)
Computing and Applying Trust in Web-Based Social Networks
-
-
Golbeck, J.A.1
-
10
-
-
70350070568
-
Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks
-
Shaikh, R.A., Jameel, H., d’Auriol, B.J., Lee, H., Lee, S., Song, Y.J.: Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems 20(11), 1698–1712 (2009)
-
(2009)
IEEE Transactions on Parallel and Distributed Systems
, vol.20
, Issue.11
, pp. 1698-1712
-
-
Shaikh, R.A.1
Jameel, H.2
D’Auriol, B.J.3
Lee, H.4
Lee, S.5
Song, Y.J.6
-
11
-
-
58249109897
-
RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks
-
PDCAT 2008, Dunedin, New Zealand
-
Alzaid, H., Foo, E., Nieto, J.G.: RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks. In: Proceedings of the 9th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2008, Dunedin, New Zealand, pp. 419–424 (2008)
-
(2008)
Proceedings of the 9Th International Conference on Parallel and Distributed Computing, Applications and Technologies
, pp. 419-424
-
-
Alzaid, H.1
Foo, E.2
Nieto, J.G.3
-
12
-
-
56949106800
-
A trust-based security system for ubiquitous and pervasive computing environments
-
Boukerche, A., Ren, Y.: A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications 31(18), 4343–4351 (2008)
-
(2008)
Computer Communications
, vol.31
, Issue.18
, pp. 4343-4351
-
-
Boukerche, A.1
Ren, Y.2
-
13
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol
-
Lausanne, Switzerland
-
Buchegger, S., Boudec, J.-Y.L.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2002, Lausanne, Switzerland, pp. 226–236 (2002)
-
(2002)
Proceedings of the 3Rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, Mobihoc 2002
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
14
-
-
51849166945
-
A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks
-
Beijing, China
-
Srinivasan, A., Li, F., Wu, J.: A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks. In: Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS 2008, Beijing, China, pp. 364–369 (2008)
-
(2008)
Proceedings of the 28Th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS 2008
, pp. 364-369
-
-
Srinivasan, A.1
Li, F.2
Wu, J.3
-
15
-
-
36949013183
-
DRBTS: Distributed Reputation-based Beacon Trust System
-
Indianapolis, Indiana, USA
-
Srinivasan, A., Teitelbaum, J., Wu, J.: DRBTS: Distributed Reputation-based Beacon Trust System. In: 2nd International Symposium on Dependable Autonomic and Secure Computing, DASC 2006, Indianapolis, Indiana, USA, pp. 277–283 (2006)
-
(2006)
2Nd International Symposium on Dependable Autonomic and Secure Computing, DASC 2006
, pp. 277-283
-
-
Srinivasan, A.1
Teitelbaum, J.2
Wu, J.3
-
16
-
-
47249087788
-
A formal reputation system for trusting wireless sensor network
-
Xiao, D., Feng, J., Zhang, H.: A formal reputation system for trusting wireless sensor network. Wuhan University Journal of Natural Sciences 13(2), 173–179 (2008)
-
(2008)
Wuhan University Journal of Natural Sciences
, vol.13
, Issue.2
, pp. 173-179
-
-
Xiao, D.1
Feng, J.2
Zhang, H.3
-
17
-
-
77949974817
-
PLUS: Parameterised localised trust management-based security framework for sensor networks
-
Yao, Z., Kim, D., Doh, Y.: PLUS: parameterised localised trust management-based security framework for sensor networks. IJSNET 3(4), 224–236 (2008)
-
(2008)
IJSNET
, vol.3
, Issue.4
, pp. 224-236
-
-
Yao, Z.1
Kim, D.2
Doh, Y.3
-
18
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2-3), 293–315 (2003)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
19
-
-
2942662944
-
Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks
-
Michiardi, P., Molva, R.: Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks. European Wireless Conference (2002)
-
(2002)
European Wireless Conference
-
-
Michiardi, P.1
Molva, R.2
-
20
-
-
79953047033
-
Security in Wireless Sensor Networks
-
Stamp, M., Stavroulakis, P. (eds.), ch. 26, Springer, Heidelberg
-
Kifayat, K., Merabti, M., Shi, Q., Llewellyn-Jones, D.: Security in Wireless Sensor Networks. In: Stamp, M., Stavroulakis, P. (eds.) Handbook of Information and Communication Security, ch. 26, pp. 513–552. Springer, Heidelberg (2010)
-
(2010)
Handbook of Information and Communication Security
, pp. 513-552
-
-
Kifayat, K.1
Merabti, M.2
Shi, Q.3
Llewellyn-Jones, D.4
-
21
-
-
84871210733
-
Secure data aggregation in wireless sensor network: A survey
-
AISC 2008, Wollongong, NSW, Australia
-
Alzaid, H., Foo, E., Nieto, J.M.G.: Secure data aggregation in wireless sensor network: A survey: In: Proceedings of the 6th Australasian Information Security Conference, AISC 2008, Wollongong, NSW, Australia, pp. 93–105 (2008)
-
(2008)
Proceedings of the 6Th Australasian Information Security Conference
, pp. 93-105
-
-
Alzaid, H.1
Foo, E.2
Nieto, J.M.G.3
-
22
-
-
84979017257
-
-
Ph.D. dissertation, Queensland University of Technology, Brisbane, Australia, The thesis is retrieved May 24
-
Ismail, R.: Security of Reputation Systems. Ph.D. dissertation, Queensland University of Technology, Brisbane, Australia (2004), The thesis is retrieved May 24, 2012
-
(2004)
Security of Reputation Systems
-
-
Ismail, R.1
-
23
-
-
80052331704
-
Challenges for Robust Trust and Reputation Systems
-
Saint Malo, France
-
Jøsang, A., Golbeck, J.: Challenges for Robust Trust and Reputation Systems. In: Proceedings of the 5th International Workshop on Security and Trust Management (STM 2009), Saint Malo, France, pp. 1–6 (2009)
-
(2009)
Proceedings of the 5Th International Workshop on Security and Trust Management (STM 2009)
, pp. 1-6
-
-
Jøsang, A.1
Golbeck, J.2
-
24
-
-
33750013012
-
Overcoming free-riding behavior in peer-to-peer systems
-
Feldman, M., Chuang, J.: Overcoming free-riding behavior in peer-to-peer systems. SIGecom Exchanges 5(4), 41–50 (2005)
-
(2005)
Sigecom Exchanges
, vol.5
, Issue.4
, pp. 41-50
-
-
Feldman, M.1
Chuang, J.2
-
25
-
-
4544235015
-
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Michiardi, P., Molva, R.: CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Communications and Multimedia Security, vol. 228, pp. 107–121 (2002)
-
(2002)
Communications and Multimedia Security
, vol.228
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
26
-
-
34548043694
-
Trust-based security for wireless ad hoc and sensor networks
-
Boukerche, A., Xu, L., El-Khatib, K.: Trust-based security for wireless ad hoc and sensor networks. Computer Communications 30(11-12), 2413–2427 (2007)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2413-2427
-
-
Boukerche, A.1
Xu, L.2
El-Khatib, K.3
-
27
-
-
44049086574
-
Continuous Ratings in Discrete Bayesian Reputation Systems
-
Saint Malo, France
-
Jøsang, A., Luo, X., Chen, X.: Continuous Ratings in Discrete Bayesian Reputation Systems. In: Proceedings of the 2nd Joint iTrust and PST Conference on Privacy, Trust Management and Security, Saint Malo, France, pp. 151–166 (2008)
-
(2008)
Proceedings of the 2Nd Joint Itrust and PST Conference on Privacy, Trust Management and Security
, pp. 151-166
-
-
Jøsang, A.1
Luo, X.2
Chen, X.3
-
28
-
-
84973983552
-
Exposition of a New Theory on the Measurement of Risk
-
Bernoulli, D.: Exposition of a New Theory on the Measurement of Risk. Econometrica 22(1), 23–36 (1954), http://dx.doi.org/10.2307/1909829
-
(1954)
Econometrica
, vol.22
, Issue.1
, pp. 23-36
-
-
Bernoulli, D.1
-
30
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, Massachusetts, United States
-
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MOBICOM, Boston, Massachusetts, United States, pp. 255–265 (2000)
-
(2000)
Proceedings of the 6Th Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
31
-
-
51249105170
-
Agent-Based Trust Management Model for Wireless Sensor Networks
-
Busan, Korea
-
Chen, H., Wu, H., Hu, J., Gao, C.: Agent-Based Trust Management Model for Wireless Sensor Networks. In: Proceedings of the International Conference on Multimedia and Ubiquitous Engineering, MUE 2008, Busan, Korea, pp. 150–154 (2008)
-
(2008)
Proceedings of the International Conference on Multimedia and Ubiquitous Engineering, MUE 2008
, pp. 150-154
-
-
Chen, H.1
Wu, H.2
Hu, J.3
Gao, C.4
-
33
-
-
56749178540
-
Functional Reputation Based Data Aggregation for Wireless Sensor Networks
-
Avignon, France
-
Özdemir, S.: Functional Reputation Based Data Aggregation for Wireless Sensor Networks. In: Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2008, Avignon, France, pp. 592–597 (2008)
-
(2008)
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Wimob 2008
, pp. 592-597
-
-
Özdemir, S.1
-
34
-
-
44849093503
-
Reputation-based framework for high integrity sensor networks
-
Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks 4(3), 1–37 (2008)
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, Issue.3
, pp. 1-37
-
-
Ganeriwal, S.1
Balzano, L.K.2
Srivastava, M.B.3
-
35
-
-
37349084148
-
Reputation-based Trust in Wireless Sensor Networks
-
Seoul, Korea
-
Chen, H., Wu, H., Zhou, X., Gao, C.: Reputation-based Trust in Wireless Sensor Networks. In: Proceedings of the International Conference on Multimedia and Ubiquitous Engineering, MUE 2007, Seoul, Korea, pp. 603–607 (2007)
-
(2007)
Proceedings of the International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
, pp. 603-607
-
-
Chen, H.1
Wu, H.2
Zhou, X.3
Gao, C.4
-
37
-
-
79960423670
-
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
-
Crosby, G.V., Hester, L., Pissinou, N.: Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks. International Journal on Network Security 12(2), 107–117 (2011)
-
(2011)
International Journal on Network Security
, vol.12
, Issue.2
, pp. 107-117
-
-
Crosby, G.V.1
Hester, L.2
Pissinou, N.3
-
38
-
-
77955120231
-
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
-
Boston, Massachusetts, USA
-
Perez-Toro, C., Panta, R., Bagchi, S.: RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network. In: Proceedings of the 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks, SECON, Boston, Massachusetts, USA, pp. 1–9 (2010)
-
(2010)
Proceedings of the 7Th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks, SECON
, pp. 1-9
-
-
Perez-Toro, C.1
Panta, R.2
Bagchi, S.3
|