메뉴 건너뛰기




Volumn 401, Issue , 2013, Pages 66-82

Reputation-based trust systems for wireless sensor networks: A comprehensive review

Author keywords

Bad mouthing; Ballot; Newcomer; On off; Replay; Reputation; Selective forwarding; Sensor networks; Spoofed data; Sybil; Taxonomy

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY; SENSOR NETWORKS; TANTALUM COMPOUNDS; TAXONOMIES;

EID: 84978970998     PISSN: 18684238     EISSN: 1868422X     Source Type: Book Series    
DOI: 10.1007/978-3-642-38323-6_5     Document Type: Conference Paper
Times cited : (35)

References (38)
  • 5
    • 0002336395 scopus 로고    scopus 로고
    • Trust as a Commodity
    • Gambetta, D. (ed.), 3rd edn., Basil Blackwell Publishing Ltd., Oxford
    • Dasgupta, P.: Trust as a Commodity. In: Gambetta, D. (ed.) Trust Making and Breaking Cooperative Relations, 3rd edn., pp. 49–72. Basil Blackwell Publishing Ltd., Oxford (2000)
    • (2000) Trust Making and Breaking Cooperative Relations , pp. 49-72
    • Dasgupta, P.1
  • 6
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 7
    • 0141975217 scopus 로고    scopus 로고
    • Experimental games for the design of reputation management systems
    • Keser, C.: Experimental games for the design of reputation management systems. IBM Systems Journal 42(3), 498–506 (2003)
    • (2003) IBM Systems Journal , vol.42 , Issue.3 , pp. 498-506
    • Keser, C.1
  • 12
    • 56949106800 scopus 로고    scopus 로고
    • A trust-based security system for ubiquitous and pervasive computing environments
    • Boukerche, A., Ren, Y.: A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications 31(18), 4343–4351 (2008)
    • (2008) Computer Communications , vol.31 , Issue.18 , pp. 4343-4351
    • Boukerche, A.1    Ren, Y.2
  • 16
    • 47249087788 scopus 로고    scopus 로고
    • A formal reputation system for trusting wireless sensor network
    • Xiao, D., Feng, J., Zhang, H.: A formal reputation system for trusting wireless sensor network. Wuhan University Journal of Natural Sciences 13(2), 173–179 (2008)
    • (2008) Wuhan University Journal of Natural Sciences , vol.13 , Issue.2 , pp. 173-179
    • Xiao, D.1    Feng, J.2    Zhang, H.3
  • 17
    • 77949974817 scopus 로고    scopus 로고
    • PLUS: Parameterised localised trust management-based security framework for sensor networks
    • Yao, Z., Kim, D., Doh, Y.: PLUS: parameterised localised trust management-based security framework for sensor networks. IJSNET 3(4), 224–236 (2008)
    • (2008) IJSNET , vol.3 , Issue.4 , pp. 224-236
    • Yao, Z.1    Kim, D.2    Doh, Y.3
  • 18
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2-3), 293–315 (2003)
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 19
    • 2942662944 scopus 로고    scopus 로고
    • Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks
    • Michiardi, P., Molva, R.: Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks. European Wireless Conference (2002)
    • (2002) European Wireless Conference
    • Michiardi, P.1    Molva, R.2
  • 22
    • 84979017257 scopus 로고    scopus 로고
    • Ph.D. dissertation, Queensland University of Technology, Brisbane, Australia, The thesis is retrieved May 24
    • Ismail, R.: Security of Reputation Systems. Ph.D. dissertation, Queensland University of Technology, Brisbane, Australia (2004), The thesis is retrieved May 24, 2012
    • (2004) Security of Reputation Systems
    • Ismail, R.1
  • 24
    • 33750013012 scopus 로고    scopus 로고
    • Overcoming free-riding behavior in peer-to-peer systems
    • Feldman, M., Chuang, J.: Overcoming free-riding behavior in peer-to-peer systems. SIGecom Exchanges 5(4), 41–50 (2005)
    • (2005) Sigecom Exchanges , vol.5 , Issue.4 , pp. 41-50
    • Feldman, M.1    Chuang, J.2
  • 25
    • 4544235015 scopus 로고    scopus 로고
    • CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • Michiardi, P., Molva, R.: CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Communications and Multimedia Security, vol. 228, pp. 107–121 (2002)
    • (2002) Communications and Multimedia Security , vol.228 , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 26
    • 34548043694 scopus 로고    scopus 로고
    • Trust-based security for wireless ad hoc and sensor networks
    • Boukerche, A., Xu, L., El-Khatib, K.: Trust-based security for wireless ad hoc and sensor networks. Computer Communications 30(11-12), 2413–2427 (2007)
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2413-2427
    • Boukerche, A.1    Xu, L.2    El-Khatib, K.3
  • 28
    • 84973983552 scopus 로고
    • Exposition of a New Theory on the Measurement of Risk
    • Bernoulli, D.: Exposition of a New Theory on the Measurement of Risk. Econometrica 22(1), 23–36 (1954), http://dx.doi.org/10.2307/1909829
    • (1954) Econometrica , vol.22 , Issue.1 , pp. 23-36
    • Bernoulli, D.1
  • 32
  • 37
    • 79960423670 scopus 로고    scopus 로고
    • Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
    • Crosby, G.V., Hester, L., Pissinou, N.: Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks. International Journal on Network Security 12(2), 107–117 (2011)
    • (2011) International Journal on Network Security , vol.12 , Issue.2 , pp. 107-117
    • Crosby, G.V.1    Hester, L.2    Pissinou, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.