Critical nodes selection based on trust evaluation in Ad Hoc networks

被引:0
|
作者
Liu, Zhuo-Chao [1 ]
Yang, Li [1 ]
Jiang, Qi [1 ]
Wang, Wei [2 ]
Cao, Chun-Jie [3 ]
机构
[1] School of Computer Science and Technology, Xidian University, Xi'an,710071, China
[2] Science and Technology on Communication Information Security Control Laboratory, The 36th Research Institute of CETC, Jiaxing,314033, China
[3] College of Information Science and Technology, Hainan University, Haikou,570228, China
关键词
D O I
10.3969/j.issn.1000-436x.2014.z2.029
中图分类号
学科分类号
摘要
引用
收藏
页码:213 / 219
相关论文
共 50 条
  • [31] A trust-based routing protocol for ad hoc networks
    Xue, XY
    Leneutre, J
    Ben-Othman, J
    MOBILE AND WIRELESS COMMUNICATION NETWORKS, 2005, 162 : 251 - 262
  • [32] A reputation-based trust mechanism for ad hoc networks
    Rebahi, Y
    Mujica-V, VE
    Sisalem, D
    10TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2005, : 37 - 42
  • [33] Research on the Critical Nodes Compensation Algorithm in Sparse Ad hoc Wireless Networks
    Chen Chun-mei
    Jiang Hong
    Yang Shi-en
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 359 - +
  • [34] The Critical Range in Clustered Ad Hoc Networks: An Analysis for Gaussian Distributed Nodes
    Michalopoulou, Maria
    Maehoenen, Petri
    IEEE COMMUNICATIONS LETTERS, 2015, 19 (05) : 811 - 814
  • [35] Trust Based Monitoring Approach for Mobile Ad Hoc Networks
    Battat, Nadia
    Makhoul, Abdallah
    Kheddouci, Hamamache
    Medjahed, Sabrina
    Aitouazzoug, Nadia
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, ADHOC-NOW 2017, 2017, 10517 : 55 - 62
  • [36] Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks
    Qureshi, Kashif Naseer
    Nafea, Hanaa
    Tariq Javed, Ibrahim
    Zrar Ghafoor, Kayhan
    IEEE ACCESS, 2024, 12 : 95390 - 95401
  • [37] Information theoretic framework of trust modeling and evaluation for ad hoc networks
    Sun, YL
    Yu, W
    Han, Z
    Liu, KJR
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 305 - 317
  • [38] A NOVEL TRUST ROUTING SCHEME BASED ON NODE BEHAVIOUR EVALUATION FOR MOBILE AD HOC NETWORKS
    Chen, Hongsong
    Fu Zhongchuan
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (08): : 1063 - 1074
  • [39] The Controversy of Selfish Nodes in Ad Hoc Networks
    Toh, C. K.
    Kim, Dongkyun
    Oh, Sutaek
    Yoo, Hongseok
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1087 - 1092
  • [40] An authentication service based on trust and clustering in wireless ad hoc networks: Description and security evaluation
    Ngai, Edith C. H.
    Lyu, Michael R.
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 94 - +