Game theory based trust management method for mobile ad hoc networks

被引:2
|
作者
Guo, Jing-Jing [1 ]
Ma, Jian-Feng [1 ,2 ]
Li, Qi [1 ]
Wan, Tao [3 ]
Gao, Cong [1 ]
Zhang, Liang [1 ]
机构
[1] School of Computer, Xidian University, Xi'an,710071, China
[2] Science and Technology on Communication Information Security Control Laboratory, Jiaxing,314033, China
[3] School of Information Engineering, East China Jiaotong University, Nanchang,330013, China
来源
关键词
D O I
10.3969/j.issn.1000-436x.2014.11.006
中图分类号
学科分类号
摘要
引用
收藏
页码:50 / 58
相关论文
共 50 条
  • [31] Applications of Game Theory to Mobile Ad Hoc Networks: Node Spreading Potential Game
    Kusyk, Janusz
    Uyar, M. Umit
    Urrea, Elkin
    Fecko, Mariusz A.
    Samtani, Sunil
    2009 IEEE SARNOFF SYMPOSIUM, CONFERENCE PROCEEDINGS, 2009, : 65 - +
  • [32] Reputation based trust management using TCG in Mobile Ad-Hoc networks (RTA)
    Kpodjedo, Segla
    Pierre, Samuel
    Pourzandi, Makan
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 507 - +
  • [33] Trust based Security schemes in Mobile Ad Hoc Networks - A Review
    Sivagurunathan, S.
    Prathapchandran, K.
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING APPLICATIONS (ICICA 2014), 2014, : 291 - 295
  • [34] EFFICIENT TRANSMISSION AND TRUST BASED PROTOCOL IN MOBILE AD HOC NETWORKS
    Praveena
    Sangeetha, D.
    Showmyaa, M.
    Karthik, S.
    IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORK SECURITY (ICSNS 2018), 2018, : 239 - 245
  • [35] A Cluster-Based Trust Model for Mobile Ad hoc Networks
    Chen Aiguo
    Xu Guoai
    Yang Yixian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4578 - 4581
  • [36] Distributed Trust Based Routing in Mobile Ad-Hoc Networks
    Jain, Shalabh
    Baras, John S.
    2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, : 1801 - 1807
  • [37] Cooperative communications based on trust model for mobile ad hoc networks
    Wang, K.
    Wu, M.
    IET INFORMATION SECURITY, 2010, 4 (02) : 68 - 79
  • [38] Regression-based trust model for mobile ad hoc networks
    Venkataraman, R.
    Pushpalatha, M.
    Rao, T. Rama
    IET INFORMATION SECURITY, 2012, 6 (03) : 131 - 140
  • [39] Trust prediction and trust-based source routing in mobile ad hoc networks
    Xia, Hui
    Jia, Zhiping
    Li, Xin
    Ju, Lei
    Sha, Edwin H. -M.
    AD HOC NETWORKS, 2013, 11 (07) : 2096 - 2114
  • [40] Hierarchical trust management of community of interest groups in mobile ad hoc networks
    Chen, Ing-Ray
    Guo, Jia
    AD HOC NETWORKS, 2015, 33 : 154 - 167