An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications
Published 2014 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications
Authors
Keywords
-
Journal
IEEE Internet of Things Journal
Volume 1, Issue 1, Pages 58-69
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Online
2014-03-28
DOI
10.1109/jiot.2014.2314132
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- TC-BAC: A trust and centrality degree based access control model in wireless sensor networks
- (2013) Junqi Duan et al. Ad Hoc Networks
- A new data aggregation scheme via adaptive compression for wireless sensor networks
- (2012) Priya Kasirajan et al. ACM Transactions on Sensor Networks
- Trust prediction and trust-based source routing in mobile ad hoc networks
- (2012) Hui Xia et al. Ad Hoc Networks
- Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks
- (2012) Rui Zhang et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Localized Geographic Routing to a Mobile Sink with Guaranteed Delivery in Sensor Networks
- (2012) Xu Li et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Securing the Internet of Things
- (2011) Rodrigo Roman et al. COMPUTER
- Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
- (2011) Yanli Yu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory
- (2011) Renjian Feng et al. SENSORS
- Evolution of Strategies With Different Representation Schemes in a Spatial Iterated Prisoner's Dilemma Game
- (2011) Hisao Ishibuchi et al. IEEE Transactions on Computational Intelligence and AI in Games
- Trust management systems for wireless sensor networks: Best practices
- (2010) Javier Lopez et al. COMPUTER COMMUNICATIONS
- Distributed iterative quantization for interference characterization in wireless networks
- (2010) Vibhav Kapnadak et al. DIGITAL SIGNAL PROCESSING
- Designing and deploying a building-wide cognitive radio network testbed
- (2010) Timothy Newman et al. IEEE COMMUNICATIONS MAGAZINE
- Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix
- (2010) Hangyang Dai et al. IEEE SENSORS JOURNAL
- A survey of secure mobile Ad Hoc routing protocols
- (2009) Loay Abusalah et al. IEEE Communications Surveys and Tutorials
- Two-factor user authentication in wireless sensor networks
- (2009) Manik Lal Das IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- A Collusion-Resistant Routing Scheme for Noncooperative Wireless Ad Hoc Networks
- (2009) Sheng Zhong et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- A trust degree based access control in grid environments
- (2009) Junzhou Luo et al. INFORMATION SCIENCES
- Mitigating DoS attacks against broadcast authentication in wireless sensor networks
- (2008) Peng Ning et al. ACM Transactions on Sensor Networks
- Game theoretic approach in routing protocol for wireless ad hoc networks
- (2008) Mohammad Naserian et al. Ad Hoc Networks
- Defense of trust management vulnerabilities in distributed networks
- (2008) Yan Sun et al. IEEE COMMUNICATIONS MAGAZINE
- Trust-based evolutionary game model assisting AODV routing against selfishness
- (2008) K. Komathy et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Become a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get StartedAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started