Critical nodes selection based on trust evaluation in Ad Hoc networks

被引:0
|
作者
Liu, Zhuo-Chao [1 ]
Yang, Li [1 ]
Jiang, Qi [1 ]
Wang, Wei [2 ]
Cao, Chun-Jie [3 ]
机构
[1] School of Computer Science and Technology, Xidian University, Xi'an,710071, China
[2] Science and Technology on Communication Information Security Control Laboratory, The 36th Research Institute of CETC, Jiaxing,314033, China
[3] College of Information Science and Technology, Hainan University, Haikou,570228, China
关键词
D O I
10.3969/j.issn.1000-436x.2014.z2.029
中图分类号
学科分类号
摘要
引用
收藏
页码:213 / 219
相关论文
共 50 条
  • [1] Cluster based trust evaluation in ad hoc networks
    Park, C
    Lee, Y
    Yoon, H
    Jin, S
    Choi, D
    7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 503 - 507
  • [2] A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks
    Chiejina, Eric
    Xiao, Hannan
    Christianson, Bruce
    Mylonas, Alexios
    Chiejina, Chidinma
    SENSORS, 2022, 22 (02)
  • [3] Secure Route Selection Based on Trust Territories for Ad Hoc Networks
    Bai, Zhongying
    Bai, Yuan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4388 - +
  • [4] Trust modeling and evaluation in ad hoc networks
    Sun, Y
    Yu, W
    Han, Z
    Liu, KJR
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1862 - 1867
  • [5] On Trust Evaluation in Mobile Ad Hoc Networks
    Dang Quan Nguyen
    Lamont, Louise
    Mason, Peter C.
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 1 - 13
  • [6] On trust models and trust evaluation metrics for ad hoc networks
    Theodorakopoulos, G
    Baras, JS
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 318 - 328
  • [7] Dynamic trust evaluation based routing model for ad hoc networks
    Wei, G
    Xiong, ZW
    Li, ZT
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 727 - 730
  • [8] Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks
    Sunil Kumar
    Kamlesh Dutta
    Wireless Personal Communications, 2018, 101 : 2029 - 2052
  • [9] Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks
    Kumar, Sunil
    Dutta, Kamlesh
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (04) : 2029 - 2052
  • [10] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Ahmed, Adnan
    Abu Bakar, Kamalrulnizam
    Channa, Muhammad Ibrahim
    Haseeb, Khalid
    Khan, Abdul Waheed
    FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) : 280 - 296