4.7 Article

Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks

Yanwei Wang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2014)

Article Computer Science, Information Systems

Trust establishment in cooperative wireless relaying networks

Reyhaneh Changiz et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2014)

Article Engineering, Electrical & Electronic

Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks

F. Richard Yu et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2013)

Article Engineering, Electrical & Electronic

Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications

Quansheng Guan et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2012)

Article Computer Science, Information Systems

Light-weight trust-based routing protocol for mobile ad hoc networks

N. Marchang et al.

IET INFORMATION SECURITY (2012)

Article Computer Science, Information Systems

A Survey on Trust Management for Mobile Ad Hoc Networks

Jin-Hee Cho et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2011)

Article Engineering, Electrical & Electronic

Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks

Shengrong Bu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2011)

Article Engineering, Electrical & Electronic

Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks

Shengrong Bu et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2011)

Article Computer Science, Information Systems

AOS: an anonymous overlay system for mobile ad hoc networks

Rui Zhang et al.

WIRELESS NETWORKS (2011)

Article Computer Science, Hardware & Architecture

Biologically Inspired Consensus-Based Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios

F. Richard Yu et al.

IEEE NETWORK (2010)

Article Engineering, Electrical & Electronic

A Survey of Trust and Reputation Management Systems in Wireless Communications

Han Yu et al.

PROCEEDINGS OF THE IEEE (2010)

Article Computer Science, Information Systems

A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks

F. Richard Yu et al.

IEEE Transactions on Network and Service Management (2010)

Article Computer Science, Hardware & Architecture

SECURING RESOURCE-CONSTRAINED WIRELESS AD HOC NETWORKS

Yuguang Fang et al.

IEEE WIRELESS COMMUNICATIONS (2009)

Article Computer Science, Information Systems

SPREAD: Improving network security by multipath routing in mobile ad hoc networks

Wenjing Lou et al.

WIRELESS NETWORKS (2009)

Article Computer Science, Hardware & Architecture

Securing mobile ad hoc networks with certificateless public keys

Yanchao Zhang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2006)

Article Computer Science, Software Engineering

Dempster-Shafer theory for intrusion detection in ad hoc networks

TM Chen et al.

IEEE INTERNET COMPUTING (2005)

Article Computer Science, Hardware & Architecture

Intrusion detection in wireless ad hoc networks

A Mishra et al.

IEEE WIRELESS COMMUNICATIONS (2004)

Article Engineering, Electrical & Electronic

Routing security in wireless ad hoc networks

HM Deng et al.

IEEE COMMUNICATIONS MAGAZINE (2002)