Malicious node detection scheme based on correlation of data and network topology in fog computing-based vanets

K Gu, XY Dong, WJ Jia - IEEE Transactions on Cloud …, 2020 - ieeexplore.ieee.org
In vehicle ad hoc networks (VANETs), if a legal vehicle node becomes malicious, then it is
more likely to tamper with transferred data or provide false data easily. Because the …

A social-based watchdog system to detect selfish nodes in opportunistic mobile networks

B Jedari, F Xia, H Chen, SK Das, A Tolba… - Future Generation …, 2019 - Elsevier
Detecting selfish nodes in opportunistic mobile networks can reduce the loss of network
resources, thus improve the data delivery performance. Most of existing detection schemes …

A provenance-aware distributed trust model for resilient unmanned aerial vehicle networks

C Ge, L Zhou, GP Hancke, C Su - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
An unmanned aerial vehicle (UAV) network is an emerging industrial IoT network for
collaborative UAV communication and management. The open architecture and dynamic …

A distributed trust management scheme for data forwarding in satellite DTN emergency communications

P Asuquo, H Cruickshank, CPA Ogah… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Satellite communications can be used when other communication systems are either
destroyed or overloaded. Observation satellites and delay/disruption tolerant networks …

Trust management in mobile ad hoc networks for bias minimization and application performance maximization

R Chen, J Guo, F Bao, JH Cho - Ad Hoc Networks, 2014 - Elsevier
Trust management for mobile ad hoc networks (MANETs) has emerged as an active
research area as evidenced by the proliferation of trust/reputation protocols to support …

Rule caching in SDN-enabled mobile access networks

M Dong, H Li, K Ota, J Xiao - IEEE Network, 2015 - ieeexplore.ieee.org
An SDN enabled mobile access network is a future network with great potential to support
scalable and flexible network applications. To support various network applications, the …

A survey on human-centric communications in non-cooperative wireless relay networks

B Jedari, F Xia, Z Ning - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
The performance of data delivery in wireless relay networks (WRNs), such as delay-tolerant
networks and device-to-device communications heavily relies on the cooperation of mobile …

ReFIoV: A novel reputation framework for information-centric vehicular applications

N Magaia, Z Sheng - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
In this paper, a novel reputation framework for information-centric vehicular applications
leveraging on machine learning and the artificial immune system (AIS), also known as …

PROVEST: provenance-based trust model for delay tolerant networks

JH Cho, R Chen - IEEE Transactions on Dependable and …, 2016 - ieeexplore.ieee.org
Delay tolerant networks (DTNs) are often encountered in military network environments
where end-to-end connectivity is not guaranteed due to frequent disconnection or delay …

A taxonomy on misbehaving nodes in delay tolerant networks

W Khalid, Z Ullah, N Ahmed, Y Cao, M Khalid… - computers & …, 2018 - Elsevier
Abstract Delay Tolerant Networks (DTNs) are type of Intermittently Connected Networks
(ICNs) featured by long delay, intermittent connectivity, asymmetric data rates and high error …