A survey on trust and reputation schemes in ad hoc networks

MA Azer, SM El-Kassas, AWF Hassan… - 2008 Third …, 2008 - ieeexplore.ieee.org
The dynamic and cooperative nature of ad hoc networks present substantial challenges in
securing these networks. There is a natural incentive for nodes to only consume, but not …

Virtual play in free-viewpoint video: Reinterpreting samuel beckett for virtual reality

N O'Dwyer, N Johnson, E Bates… - … on Mixed and …, 2017 - ieeexplore.ieee.org
Since the early years of the twenty-first century, the performing arts have been party to an
increasing number of digital media projects that bring renewed attention to questions about …

[PDF][PDF] Security And Reputation Schemes In Ad-Hoc Networks Routing

A Kush - International Journal of Information Technology and …, 2009 - csjournals.com
Ad hoc networks have vital problem concerning their security aspects. These must be solved
in order to realize complete Ad hoc applications. The dynamic and cooperative nature of ad …

Security in ad hoc networks: from vulnerability to risk management

MA Azer, SM El-Kassas… - 2009 Third International …, 2009 - ieeexplore.ieee.org
Mobile Ad hoc Networks (MANETs) have lots of applications. Due to the features of open
medium, absence of infrastructure, dynamic changing network topology, cooperative …

Ubiquitous object categorization and identity

UP Kulkarni, JV Vadavi, SM Joshi… - … for Modelling Control …, 2006 - ieeexplore.ieee.org
The advances in computing technologies have resulted in an explosive growth in computing
systems called Ubiquitous Computing Systems [Ubicomp] and also the applications that …

Node level security management and authentication in mobile ad hoc networks

RM Savola - 2009 Tenth International Conference on Mobile …, 2009 - ieeexplore.ieee.org
Self-organization introduces major challenges to security and trust management in mobile
ad hoc networks. In addition, security threats and vulnerabilities include lack of proper …

Improving Quality of Service of trust based system against wormhole attack by multi-path routing method

M Ojha, RS Kushwah - 2015 International Conference on Soft …, 2015 - ieeexplore.ieee.org
The infrastructure of MANET is such that it does not have a fixed route path for routing and
each nodes can individually acts as a base station. There is no centralized network. There …

Secure eHealth‐Care Service on Self‐Organizing Software Platform

IY Jung, GJ Jang, SJ Kang - Mathematical Problems in …, 2014 - Wiley Online Library
There are several applications connected to IT health devices on the self‐organizing
software platform (SoSp) that allow patients or elderly users to be cared for remotely by their …

Survey report on MANETs trust management

SV Babu, CKS Vijila - Advances in Natural and Applied Sciences, 2017 - go.gale.com
The distributed wireless network has grown in the field of social networks, e-compares and
mainly is distracter relief center, military application which requires a co-operative …

A security management framework for sensor networks

S de Oliveira, TR de Oliveira… - NOMS 2008-2008 IEEE …, 2008 - ieeexplore.ieee.org
This paper proposes a security management framework to dynamically configure and
reconfigure security components in sensor networks according to management information …