References
- M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy: 164–176
- Z. Liu, A. W. Joy, and R. A. Thompson, A dynamic trust model for mobile ad hoc networks. IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS’04), (Suzhou, Chine), 15–23, 2004
- Rangara, R.R. Jaipuria, R.S. Intelligent Secure Routing Model For MANET .2010 3rd IEEE International Conference on Computer Science and Information Technology (2010 ICCSIT):452–456
- M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya. Quantifying trust in mobile ad-hoc networks. Proceedings of IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS’O5), (Waltham, USA), 211–223, 2005
- Pedro B. Velloso. Analyzing aHuman-based Trust Model for Mobile Ad Hoc Networks. IEEE Symposium on Computers and Communications (ISCC’2008):102–125
- Lacharite, Y and Dang Quan Nguyen. Atrust-based security architecture for tactical MANETS. IEEE Military Communications Conference. MILCOM 2008: 1–7, 2008
- E. Ayday and F. Fekri. A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks, vol. 8, no. 2:181–192, 2010
- Mingsheng Liu, Qingli Meng. The Ad Hoc Network Security Research Based on Trusted Computing and Semantic Remote Attestation. 2010 Second International Workshop on Education Technology and Computer Science (2010 ETCS):724–727
- Huafei Zhu, Feng Bao. Quantifying Trust Metrics of Recommendation Systems in Ad-hoc Networks. IEEE Wireless Communications and Networking Conference, 2007 WCNC:2906–2911, 2007
- Chen Hongsong, Ji Zhenzhou, Hu Mingzeng. Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol .Journal of Network and Computer Applications. 30(1):145–166, 2007
- M. Al-Sharman, S.M. Yoo, B. Kim, and S. Park. Two Distributive Key Management Schemes in Mobile Ad Hoc Networks. Intelligent Automation and Soft Computing, 16(4):591–603, 2010
- Y. L. Ren and A. Boukerche. ARMA: a scalable secure routing protocol with privacy protection for mobile ad hoc networks. Wireless Communications & Mobile Computing, vol. 10, no. 5: 672–687, 2010