1 |
C. Dellarocas, "Mechanism for coping with unfair rating and discriminatory behavior in online reputation reporting systems", In proceedings of ICIS,pp. 520-525, 2000.
|
2 |
V. V. Vigilkumar, V. M. A. Rajam, "Detection of Colluding Selective Forwarding Nodes in Wireless Mesh Networks Based on Channel Aware Detection Algorithm", MES Journal of Technology and Management, pp. 62-66, Vol II, Issue 1, ISSN: 0976-3724, 2011.
|
3 |
Y. L. Sun, Y. Liu, "Security of Online Reputation Systems: The evolution of attacks and defenses", IEEE Signal Process Mag. Vol 29(2), pp. 87-97, 2012.
DOI
ScienceOn
|
4 |
Y. Sun, H. Luo, S. K. Das, "A Trust Based Framework for fault tolerant data aggregation in wireless multimedia sensor networks", IEEE Trans. Dependable Sec. Comput., vol. 9(6), pp. 785-797, 2012.
DOI
ScienceOn
|
5 |
S. D. Kamvar, M. T. Schlosser and H. Garcia Molina, "The eigentrust algorithm for reputation management in p2p networks", in Proceedings of the 12th international conference on world wide web, pp. 640-651, 2003.
|
6 |
P. England, Q. Shi, B. Askwith and F. Bouhafs, A Survey of Trust Management in Mobile Ad Hoc Networks, ISBN: 978-1-902560-26-7, 2012.
|
7 |
M. R. S. Abyaneh, "Security Analysis of Lightweight Schemes for RFID Systems", Ph. D. THESIS, University of Bergen, Norway, (June 2012).
|
8 |
H. Harney, C. Muckenhirn, "Group Key Management Protocol Specification", Internet Request for Comments 2093, July 1997.
|
9 |
H. Harney, U. Meth, A. Colegrove, "Group Secure Association Key Management Protocol", Internet Request for Comments 4535, June 2006.
|
10 |
B. Weis, S. Rowles and T. Hardjono, " The Group Domain of Interpretation", Internet Request for Comments 6407, October 2011.
|
11 |
M. Baugher, B. Weis, T. Hardjono, H. Harney, "The Group Domain of Interpretation", Internet Request for Comments 3547, July 2003.
|
12 |
P. Hoffman, "Algorithm for Internet Key Exchange version 1 (IKEv1)", Internet Request for Comments 4109, May 2005.
|
13 |
C. Kaufman, "Internet Key Exchange (IKEv2) Protocol", Internet Request for Comments 4306, December 2005. http://www.ietf.org/rfc/rfc4306.txt
|
14 |
T. H. Dunigan and C. Cao, "Group Key Management", Technical Report ORNL/TM-13470, 1998.
|
15 |
M. Burmester and Y. Desmedt, "A Secure and scalable group key exchange system", In Information Processing Letters, 94(3), pp. 137-143, 2005.
DOI
ScienceOn
|
16 |
J. Huang and D. Nicol, "A calculus of trust and its application to PKI and identity management", in The 8th ACM Symposium on identity and Trust on the Internet, IDtrust'09, pp. 23-37, 2009.
|
17 |
M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system", In proceedings of Eurocrypt, LNCS 950, pp. 275-286, Springer-Verlag, 1995.
|
18 |
A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton and J. Zhao, "Habitat Monitoring Application Driver for Wireless Communication Technology", In Proceedings of the ACM SIGCOMM Workshop on Data Communication in Latin America and the Caribean, San Jose, Costa Rica, volume 31, issue 2, pp. 20-41, 2001.
|
19 |
M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system", Advances in Cryptology-Eurocrypt'94, pp. 275-286, 1994.
|
20 |
NS3 Simulator, http://www.nsnam.org
|
21 |
Y. L. Sun, Z. Han, W. Yu and K. J. R. Liu, "A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks", in Proc. of 25th IEEE International Conference on Computer Communications (INFOCOM 2006), pp. 1-13, April 2006.
|
22 |
R. Sandhu and P. Samarati, "Access control: Principles and practice", IEEE Comm., pp. 2-10, Sept. 1994.
|
23 |
R. C. Mayer, J. H. Davis and F. D. Schoorman, "An integrative Model of Organizational Trust", Academy of Management Executive, vol. 20(3), pp. 709-773, 1995.
|
24 |
A. Josang, "The right type of trust for distributed systems," in Proc. of the ACM New Security Paradigms Workshop, pp. 119-131, 1996.
|
25 |
D. Denning, "A new paradigm for trusted systems", in Proc. of ACM New Security Paradigm Workshop, pp. 36-41, 1993.
|
26 |
Henk C. A. van Tilborg, Encyclopedia of Cryptography and Security, 2nd edition, Springer-verlag, USA, 2011.
|
27 |
C. Adam and S. Farrell, "Internet X.509 public key infrastructure: Certificate management protocols." Internet Request for Comments 2510, 1999.
|
28 |
B. Ramsdell, "S/MIME Version 3 certificate handling", Internet Request for Comments 2632, 1999.
|
29 |
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithm", IEEE Transaction on Information Theory, vol. 31, pp. 469-472, 1985.
DOI
|
30 |
C. Boyd and A. Mathuria, "Key establishment protocols for secure mobile communications: A selective survey", Elsevier Computer Communication, vol. 23, issues 5-6, pp. 575-587, 1998.
|
31 |
A. Kumar, K. Gopal and A. Aggarwal, "Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks", Int. Conf. on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE 2013), Greater Noida, India, volume 115, pp 750-763, 2013.
|
32 |
J. McCumber, Assessing and Managing Security Risk in IT Systems: A Structured Methodology, 1st Edition, CRC Press, 2005.
|
33 |
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, and Gene Tsudik, "On the Performance of Group Key Agreement Protocols", ACM Transactions on Information and System Security", nol. 7, no. 3, Pages 457-488, (August 2004).
DOI
|
34 |
Paul Judge, Mostafa Ammar, "Security Issues and Solutions in Multicast Content Distribution: A Survey," IEEE Network Magazine, pp. 30-36, 2003.
|
35 |
H. Harney, C. Muckenhirn, "Group Key Management Protocol Architecture", Internet Request for Comments 2094, July 1997.
|
36 |
D. Bonch and M. Franklin, "Identity-based encryption from weil pairing," Advances in Cryptology-Crypto 2001, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
|
37 |
J. V. D. Merwe, D. Dowoud and S. McDonald, "A Survey on Peer to Peer key management for Mobile Ad Hoc Networks", ACM Computing Surveys, vol. 39, No. 1, Article 1, April 2007.
|
38 |
H. Deng, A. Mukherjee, D. Aggarwal, " Threshold and identity based key management and authentication for wireless ad hoc networks," in Proc. of the international conference on information technology: Coding and Computing (ITCC's 04), pp. 1-9, 2004.
|
39 |
Y. Zhang, W. Liu, W. Lou and Y. Fang, " Securing mobile ad hoc networks with certificateless public keys," IEEE Transaction on Dependable and Secure Computing, vol. 3, pp. 386-399, 2006.
DOI
ScienceOn
|
40 |
A. Kumar, A. Aggarwal, Charu, "Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks," in Proc. of International Conference on Contemporary Computing (IC3 2012), JIIT, Noida, India, pp. 335-346, 2012.
|
41 |
A. Schaad and J. D. Moffett, "A lightweight approach to specification and analysis of role based access control extensions", Proceedings of the seventh ACM symposium on Access control models and technologies (SACMAT'02), New York, NY, USA, pp. 13-22, 2002.
|
42 |
J. W. Bryans, J. S. Fitzgerald, "Formal engineering of XACML access control policies in VDM++", ICFEM 2007, Butler, M. Hinchey, M. G., Larrondo-Petrie, M. M. (eds.), LNCS, Springer, Heidelberg, vol. 4789, pp. 37-56, 2007.
|
43 |
K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz, "Verification and change-impact analysis of access control policies," in Proc. of 27th International Conference on Software Engineering, pp. 196-205, 2005.
|
44 |
D. Jackson, Software Abstractions: Logic, Languages, and Analysis, MIT Press, ISBN: 978-0-262-10114-1, 2006.
|
45 |
D. Jackson, "Micromodels of Software: Lightweight Modelling and Analysis with Alloy", Software Design Group, MIT Lab Manual, Feb. 2002.
|
46 |
D. Jackson, "Alloy: a lightweight object modelling notation", ACM Trans. Soft. Eng. Methodol., vol. 11, no. 2, pp. 256-290, 2002.
DOI
|
47 |
J. Crampton, "Specifying and enforcing constraints in role-based access control," in Proc. of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003), pp. 43-50, 2003.
|
48 |
M. J. Probst and S. K. Kasera, "Statistical trust establishment in wireless sensor networks", in Proceedings of the 13th International Conference on Parallel and Distributed Systems, pp. 1-8, 2007.
|
49 |
Z. Liu, A. W. Joy and R. A. Thompson, " A dynamic trust model for mobile ad hoc networks", in Proc. of IEEE International Workshop on Future T rends of Distributed Computing Systems, FTDCS'04, pp. 80-85, May 2004.
|
50 |
L. Xiong and L. Liu, "PeerTrust: Supporting reputation-based trust in peer-to-peer communities", IEEE Transaction on Knowledgement and Data Engineering, Special Issue on Peer-to-Peer Based Data Management, vol. 16, no. 7, pp. 843-857, July 2004.
|
51 |
N. Cheng, K. Govindan and P. Mohapatra, "Rendezvous based trust propagation to enhance distributed network security", in Proc. of INFOCOM-2011 Workshop SCNC, 2011., pp. 1066-1070, April 2011.
|
52 |
P. B. Velloso, R. P. Laufer, D. O. Cunha, O. C. M. B. Duarte and G. Punjollel, "Trust management in mobile ad hoc networks using a scalable maturity-based model", IEEE Trans. Netw. Service Manag, vol. 7, No. 3, pp. 172-185, Sep. 2010.
DOI
ScienceOn
|
53 |
Y. L. Sun, Z. Han, W. Yu and K. J. Ray Liu, "A trust evaluation framework in distributed networks: Vulnerability analysis and denfense against attacks", in Proc. of IEEE International Conference on Computer Communications, INFOCOM'06, pp. 1-13, April 2006.
|
54 |
Y. Sun, W. Yu, Z. Han and K. J. Ray Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks", IEEE Journal on Selected Areas of Communication, Vol. 24, No. 2, pp. 305-317, Feb. 2006.
DOI
ScienceOn
|
55 |
S. Trifunovic, F. Legendre and C. Anastasiades, "Social trust in opportunistic networks", in Proc. of INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1-6, 2010.
|
56 |
D. Quercia, S. Hailes and L. Capra, "Lightweight distributed trust propagation", in Proc. of The Seventh IEEE International Conference on Data Mining, pp. 282-291, 2007.
|
57 |
Ms", Autonomous Agents and . Pardo, "Aggregation of trust for iterated belief revision in probabilistic logics", Scalable Uncertainity Management, Lecture notes in computer science, Springer-Verlag, pp. 165-179, 2009.
|
58 |
Y. Bachrach, A. Parnes, A.D. Procaccia and J. S. Rosenschein, "Gossip-based aggregation of trust in decentralized reputation systems", Autonomous Agents and Multi-Agent Systems, vol. 19, No. 2, pp. 153-172, 2009.
DOI
|
59 |
C. M. Jonker and J. Treur, "Formal analysis of models for the dynamics of trust based on experiences", in MAAMAW'99: Proceedings of the 9th European Workshop on Modelling Autonomous Agents in a Multi-Agent World, pp. 221-232, 1999.
|
60 |
F. M. Ham, E. Y. Imana, A. Ondi, R. Ford, W. Allen and M. Reedy, "Reputation prediction in mobile adhoc networks using RBF neural networks", Engineering Applications of Neural Networks Communications in Computer and Information Science, EANN, CCIS 43, pp. 485-494, 2009.
|
61 |
P. Gogoi, D. K. Bhattacharyya, B. Borah, J. K. Kalita, " A Survey of Outlier Detection Methods in Network Anomaly Identification", The Computer Journal, vol. 54, issue 4, pp. 570-588, April 2011.
DOI
ScienceOn
|
62 |
V. Chandola, A. Banerjee and V. Kumar, "Outlier Detection: A Survey", ACM Computing Surveys, pp. 1-72, 2009.
|
63 |
Y. Zhang, N. Meratnia and P. Havinga, "Outlier Detection Techniques for Wireless Sensor Networks: A Survey", IEEE Communication Surveys & Tutorials, Vol. 12, No. 2, pp. 159- 170, 2010.
DOI
ScienceOn
|
64 |
P. Gogoi, B. Borah and D. K. Bhattacharyya, "Anomaly Detection Analysis of Intrusion Data using Supervised and Unsupervised Approach", Journal of Convergence Information Technology, Vol. 5, No. 1, Feb. 2010.
|
65 |
D. M. Hawkin, "Identification of Outliers", Chapman and Hall, London, 1980.
|
66 |
V. A. Traag, A. Browet, F. Calabrese and F. Morlot, "Social Event Detection in Massive Mobile Phone Data Using Probabilistic Location Interference", SocialCom/PASSAT, pp. 625-628, October 9-11, 2011.
|
67 |
A. Beimel, "Secure Scheme for secret Sharing and Key Distribution", Ph. D. thesis, Israel Institute of Technology, Technion, Haifa, Israel, 1996.
|
68 |
D. H. Mcknight and N. L. Chervany, "The meaning of trust", University of Minnesota, Technical repors, http://misrc.umn.edu/wpaper/WorkingPapers/9604.pdf, 1996.
|
69 |
K. Govindan, P. Mohapatra, "Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey", IEEE Communications Surveys and Tutorials, vol. 14(2), pp. 279-298, 2012.
DOI
ScienceOn
|
70 |
A. A. Pirzada and C. McDonald, "Establishing Trust in Pure Ad-hoc Networks" , Australasian Computer Science Conference, The university of Otago, Dunedin, New Zealand, 2004.
|
71 |
J. Huang and D. Nicol, "A calculus of trust and its application to PKI and identity management", in Proc. of The 8th ACM Symposium on Identity and Trust on the Internet, IDtrust'09, pp. 23-37, 2009.
|
72 |
X. Wang, L. Liu and J. Su, "Rlm: A general model for trust representation and aggregation", IEEE Transaction on Services Computing, Vol. 5. No. 1, pp. 131-143, 2012.
DOI
ScienceOn
|