Critical nodes selection based on trust evaluation in Ad Hoc networks

被引:0
|
作者
Liu, Zhuo-Chao [1 ]
Yang, Li [1 ]
Jiang, Qi [1 ]
Wang, Wei [2 ]
Cao, Chun-Jie [3 ]
机构
[1] School of Computer Science and Technology, Xidian University, Xi'an,710071, China
[2] Science and Technology on Communication Information Security Control Laboratory, The 36th Research Institute of CETC, Jiaxing,314033, China
[3] College of Information Science and Technology, Hainan University, Haikou,570228, China
关键词
D O I
10.3969/j.issn.1000-436x.2014.z2.029
中图分类号
学科分类号
摘要
引用
收藏
页码:213 / 219
相关论文
共 50 条
  • [21] A trust based model (TBM) to detect rogue nodes in vehicular ad-hoc networks (VANETS)
    Tripathi, Kuldeep Narayan
    Sharma, S. C.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2020, 11 (02) : 426 - 440
  • [22] Critical Issues in Trust Management for Mobile Ad-Hoc Networks
    Shankaran, Rajan
    Varadharajan, Vijay
    Orgun, Mehmet A.
    Hitchens, Michael
    PROCEEDINGS OF THE 2009 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2008, : 97 - 100
  • [24] Route Optimasation Based on Multidimensional Trust Evaluation Model in Mobile Ad hoc Networks
    Shabut, Antesar M.
    Dahal, Keshav
    Awan, Irfan
    Pervez, Zeeshan
    2015 SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CYBER FORENSICS (INFOSEC), 2015, : 28 - 34
  • [25] Depth-expurgation based dynamic trust evaluation algorithm for ad hoc networks
    Jia, Zhiping
    Qin, Zhiwei
    Xu, Xinshun
    Zhang, Ruihua
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2008, : 399 - 404
  • [26] Trust in mobile Ad Hoc Networks
    Veeraraghavan, Prakash
    Limaye, Vikram
    ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 330 - 334
  • [27] A Trust Based Clustering Framework for Securing Ad Hoc Networks
    Chatterjee, Pushpita
    Sengupta, Indranil
    Ghosh, S. K.
    INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT-THIRD INTERNATIONAL CONFERENCE, ICISTM 2009, 2009, 31 : 313 - 324
  • [28] A Subjective-trust based Trust Management Model in Ad Hoc Networks
    Hu Zong
    Zhang Yuan
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4876 - +
  • [29] Trust based routing for misbehavior detection in Ad hoc networks
    Gong W.
    You Z.
    Chen D.
    Zhao X.
    Gu M.
    Lam K.-Y.
    Journal of Networks, 2010, 5 (05) : 551 - 558
  • [30] Secure routing protocol based trust for ad hoc networks
    Liu, Zhiyuan
    Lu, Shejie
    Yan, Jun
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 279 - +