Key management for beyond 5G mobile small cells: A survey
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …
are unanimous that densification of mobile networks is the way forward. The densification …
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
A mobile ad hoc network is a wireless communication network which does not rely on a pre-
existing infrastructure or any centralized management. Securing the exchanges in such …
existing infrastructure or any centralized management. Securing the exchanges in such …
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
Different trust and/or reputation models have arisen in the last few years. All of them have
certain key processes in common such as scoring, ranking, rewarding, punishing or …
certain key processes in common such as scoring, ranking, rewarding, punishing or …
A distributed trust management scheme for data forwarding in satellite DTN emergency communications
Satellite communications can be used when other communication systems are either
destroyed or overloaded. Observation satellites and delay/disruption tolerant networks …
destroyed or overloaded. Observation satellites and delay/disruption tolerant networks …
A novel approach to trust management in unattended wireless sensor networks
Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of
disconnected operation and fixed or irregular intervals between sink visits. The absence of …
disconnected operation and fixed or irregular intervals between sink visits. The absence of …
A novel optimally weighted framework of piecewise gamma corrected fractional order masking for satellite image enhancement
A novel image quality enhancement framework is proposed here through a collective
inspiration of the exponential, differential and linear operational behavior of pixel intensities …
inspiration of the exponential, differential and linear operational behavior of pixel intensities …
Trust-based security for the OLSR routing protocol
The trust is always present implicitly in the protocols based on cooperation, in particular,
between the entities involved in routing operations in Ad hoc networks. Indeed, as the …
between the entities involved in routing operations in Ad hoc networks. Indeed, as the …
Mitigating denial of service attacks in OLSR protocol using fictitious nodes
With the main focus of research in routing protocols for Mobile Ad-Hoc Networks (MANET)
geared towards routing efficiency, the resulting protocols tend to be vulnerable to various …
geared towards routing efficiency, the resulting protocols tend to be vulnerable to various …
Internet of things: energy consumption and data storage
Abstract The Internet of Things (IoT) as a growing and fast new technology has recently
attracted attention from around the world. The application of IoT in several areas has showa …
attracted attention from around the world. The application of IoT in several areas has showa …
[PDF][PDF] Dynamic Trust Model for Vehicular Cyber-Physical Systems.
H Zhao, D Sun, H Yue, M Zhao, S Cheng - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Trust is a useful model for the interactions of Vehicular Ad Hoc Network (VANET) in
Vehicular Cyber-Physical System (VCPS). Given a dynamic nature in transportation …
Vehicular Cyber-Physical System (VCPS). Given a dynamic nature in transportation …