Behaviors Observations Beliefs Model for Security Enhancement Using Cognitive Reasoning
Abstract
Full Text:
PDFReferences
Guan Q, Yu FR, Jiang S, et al. Joint Topology Control and Authentication Design in Mobile Ad hoc Networks with Cooperative Communications. IEEE Trans. Veh. Tech. Jul 2012; 61: 2674–85p.
Yu FR, Tang H, Bu S, et al. Security and Quality of Service (QoS) Co-Design in Cooperative Mobile Ad hoc Networks. EURASIP J. Wireless Commun. Networking. Jul 2013; 2013: 188–90p.
Wang Y, Yu FR, Tang H, et al. A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks. IEEE Trans. Wireless Commun. Mar 2014; 13: 1616–27p.
Bu S, Yu FR, Liu P, et al. Distributed Combined Authentication and Intrusion Detection with Data Fusion in High-Security Mobile Ad hoc Networks. IEEE Trans. Veh. Tech. Mar 2011; 60: 1025–36p.
Adjih C, Raffo D, Muhlethaler P. Attacks against OLSR: Distributed Key Management for Security. In Proc. 2nd OLSR Workshop, (Domaine de Voluceau, France). Dec 2005.
Zhang Y, Liu W, Lou W, et al. Securing Mobile Ad hoc Networks with Certificateless Public Keys. IEEE Trans. Dependable and Secure Computing. Oct–Dec 2006; 3: 386–99p.
Fang Y, Zhu X, Zhang Y. Securing Resource-Constrained Wireless Ad hoc Networks. IEEE Wireless Comm. 2009; 16(2): 24–30p.
Yu FR, Tang H, Mason P, et al. A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad hoc Networks. IEEE Trans. Network and Service Management. Dec 2010; 7: 258–67p.
Lou W, Liu W, Zhang Y, et al. SPREAD: Improving Network Security by Multipath Routing in Mobile Ad hoc Networks. ACM Wireless Networks. Mar 2009; 15(3): 279–94p.
Zhang R, Zhang Y, Fang Y. AOS: An Anonymous Overlay System for Mobile Ad hoc Networks. ACM Wireless Networks. May 2011; 17(4): 843–59p.
Refbacks
- There are currently no refbacks.