메뉴 건너뛰기




Volumn , Issue , 2016, Pages 91-123

Reputation- and Trust-Based Systems forWireless Self-Organizing Networks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85138406381     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/EBK1439819197-11     Document Type: Chapter
Times cited : (7)

References (53)
  • 1
    • 36949013183 scopus 로고    scopus 로고
    • DRBTS: Distributed reputation-based Beacon trust system
    • Autonomic and Secure Computing (DASC’06), Indianapolis, USA
    • A. Srinivasan, J. Teitelbaum, and J.Wu, DRBTS: Distributed reputation-based Beacon trust system, in Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC’06), Indianapolis, USA, pp. 277-283, 2006.
    • (2006) Proceedings of the 2nd IEEE International Symposium on Dependable , pp. 277-283
    • Srinivasan, A.1    Teitelbaum, J.2    Wu, J.3
  • 3
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • Y. Hu and A. Perrig, A survey of secure wireless ad hoc routing, IEEE Security and Privacy, 2(3), 28-39, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.1    Perrig, A.2
  • 9
    • 85113133621 scopus 로고    scopus 로고
    • CORE: A COllaborative REputation mechanism to enforce node cooperation inMobile AdHocNetworks
    • Portoroz, Slovenia, September
    • P. Michiardi and R. Molva, CORE: A COllaborative REputation mechanism to enforce node cooperation inMobile AdHocNetworks, in Proceedings of the 6th IFIP Communication andMultimedia Security Conference, Portoroz, Slovenia, Vol. 228, pp. 107-121, September 2002.
    • (2002) Proceedings of the 6th IFIP Communication andMultimedia Security Conference , vol.228 , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 11
    • 33745900048 scopus 로고    scopus 로고
    • A robust reputation system for peer-to-peer and mobile ad hoc networks
    • Harvard University, Cambridge, MA, USA, June
    • S. Buchegger and J.-Y. Le Boudec, A robust reputation system for peer-to-peer and mobile ad hoc networks, in Proceedings of P2Pecon 2004, Harvard University, Cambridge, MA, USA, June 2004.
    • (2004) Proceedings of P2Pecon 2004
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 12
    • 0003839495 scopus 로고
    • Ph.D. Thesis, Department of Computer Science and Mathematics, University of Stirling
    • S. Marsh, Formulating trust as a computational concept, Ph.D. Thesis, Department of Computer Science and Mathematics, University of Stirling, 1994.
    • (1994) Formulating trust as a computational concept
    • Marsh, S.1
  • 14
    • 0141862713 scopus 로고    scopus 로고
    • Technical Report, MIS Research Center, Carlson School of Management, University of Minnesota
    • D.H. McKnight and N.L. Chervany, The Meanings of Trust, Technical Report, MIS Research Center, Carlson School of Management, University of Minnesota, 1996.
    • (1996) The Meanings of Trust
    • McKnight, D.H.1    Chervany, N.L.2
  • 15
    • 85113133621 scopus 로고    scopus 로고
    • Simulation-based analysis of security exposures in mobile ad hoc networks
    • Florence, Italy
    • P. Michiardi and R. Molva, Simulation-based analysis of security exposures in mobile ad hoc networks, in Proceedings of the EuropeanWireless Conference, Florence, Italy, pp. 107-121, 2002.
    • (2002) Proceedings of the EuropeanWireless Conference , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 20
    • 84903836776 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad hoc routing protocols
    • West Point, June
    • P.Ning and K. Sun, How to misuse AODV: A case study of insider attacks against mobile ad hoc routing protocols, in Proceedings of the 4th Annual IEEE Information AssuranceWorkshop, West Point, pp. 60-67, June 2003.
    • (2003) Proceedings of the 4th Annual IEEE Information AssuranceWorkshop , pp. 60-67
    • Ning, P.1    Sun, K.2
  • 21
    • 10644256718 scopus 로고    scopus 로고
    • Estimating the value of co-operation approaches for multi-hop ad hoc networks
    • B. Lamparter, M. Plaggemeier, and D. Westhoff, Estimating the value of co-operation approaches for multi-hop ad hoc networks, Ad Hoc Networks, 3 (1), 17-16, 2005.
    • (2005) Ad Hoc Networks , vol.3 , Issue.1 , pp. 16-17
    • Lamparter, B.1    Plaggemeier, M.2    Westhoff, D.3
  • 24
    • 84871044906 scopus 로고    scopus 로고
    • Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
    • Minneapolis, Minnesota, USA
    • C.Dellarocas, Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. in Proceedings of the ACM Conference on Electronic Commerce, Minneapolis, Minnesota, USA, pp. 150-157, 2000.
    • (2000) Proceedings of the ACM Conference on Electronic Commerce , pp. 150-157
    • Dellarocas, C.1
  • 25
    • 34547637688 scopus 로고    scopus 로고
    • Trust among strangers in Internet transactions: Empirical analysis of eBays’s reputation system
    • Elsevier Science, Amsterdam, Netherlands
    • P. Resnick and R. Zeckhauser, Trust among strangers in Internet transactions: Empirical analysis of eBays’s reputation system, Advances in Applied Microeconomics, Vol. 11, pp. 127-157, Elsevier Science, Amsterdam, Netherlands, 2002.
    • (2002) Advances in Applied Microeconomics , vol.11 , pp. 127-157
    • Resnick, P.1    Zeckhauser, R.2
  • 29
    • 11244250305 scopus 로고    scopus 로고
    • The effect of rumor spreading in reputation systems in mobile ad hoc networks
    • Sofia- Antipolis, March
    • S. Buchegger and J.-Y. Le Boudec, The effect of rumor spreading in reputation systems in mobile ad hoc networks, in Proceedings ofWiopt’ 03, Sofia- Antipolis, March 2003.
    • (2003) Proceedings ofWiopt’ 03
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 33
    • 21644475636 scopus 로고    scopus 로고
    • “Context aware inferencing to rate a selfish node in DSR-based ad hoc networks
    • Taipeh, Taiwan
    • K. Paul and D. Westhoff, “Context aware inferencing to rate a selfish node in DSR-based ad hoc networks, in Proceedings of the IEEE Globecom Conference, Taipeh, Taiwan, 2002.
    • (2002) Proceedings of the IEEE Globecom Conference
    • Paul, K.1    Westhoff, D.2
  • 36
    • 84900044615 scopus 로고    scopus 로고
    • The production of trust in online markets
    • E.J. Lawler, M. Macy, S. Thyne, H.A. Walker, eds, JAI Press, Greenwich, CT
    • P. Kollock, The production of trust in online markets, E.J. Lawler, M. Macy, S. Thyne, H.A. Walker, eds, Advances in Group Processes, Vol. 16, JAI Press, Greenwich, CT, 1999.
    • (1999) Advances in Group Processes , vol.16
    • Kollock, P.1
  • 42
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Y.L. Sun, W. Yu, Z. Han, and K.J.R. Liu, Information theoretic framework of trust modeling and evaluation for ad hoc networks, IEEE Journal on Selected Areas in Communication, 24, 305-317, 2006.
    • (2006) IEEE Journal on Selected Areas in Communication , vol.24 , pp. 305-317
    • Sun, Y.L.1    Yu, W.2    Han, Z.3    Liu, K.J.R.4
  • 43
    • 36148993172 scopus 로고    scopus 로고
    • Enforcing cooperative resource sharing in untrusted peer-to-peer environment
    • 10(6)
    • Z. Liang and W. Shi, Enforcing cooperative resource sharing in untrusted peer-to-peer environment, ACM Journal of Mobile Networks and Applications (MONET), 10(6), pp. 771-783, 2005.
    • (2005) ACM Journal of Mobile Networks and Applications (MONET) , pp. 771-783
    • Liang, Z.1    Shi, W.2
  • 52


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.