An accurate and efficient algorithm to identify malicious nodes of a graph

R Gaeta - IEEE Transactions on Information Forensics and …, 2023 - ieeexplore.ieee.org
The identification of misbehaving elements in a distributed system is an important task in
many diverse settings that can be represented as graphs; this problem can be cast as the …

Quantitative trust assessment method based on Bayesian network

Q Lin, D Ren - 2016 IEEE Advanced Information Management …, 2016 - ieeexplore.ieee.org
With the continuous development of cloud computing, Internet of Things (IoT) gradually
involves in all walks of life, which contains large amounts of sensitive information, privacy …

Engineering machine-to-machine traffic in 5G

X Li, JB Rao, H Zhang - IEEE Internet of Things Journal, 2015 - ieeexplore.ieee.org
Machine to machine (M2M) traffic is characterized as low-rate, small-packet traffic with
correlated transmissions. In this paper, we propose a two-phase traffic control mechanism …

A secure, service priority‐based incentive scheme for delay tolerant networks

Y Xie, Y Zhang - Security and Communication Networks, 2016 - Wiley Online Library
Delay tolerant networks are resource‐constrained networks, where nodes are required to
cooperate with each other to relay messages (bundles) in a store‐carry‐forward fashion …

Analysis of dos attacks in delay tolerant networks for emergency evacuation

P Asuquo, H Cruickshank, Z Sun… - … Conference on Next …, 2015 - ieeexplore.ieee.org
In the event of a disaster, there is a severe damage/destruction to physical infrastructures
such as telecommunication and power lines which result in the disruption of communication …

Trust Mechanism-Based Multi-Tier Computing System for Service-Oriented Edge-Cloud Networks

M Huang, Z Li, F Xiao, S Long… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Edge-cloud networks face security threats during data collection, data routing, and service
construction, resulting in data tampering, stealing, and communication interruption. Trust …

Distributed information-based cooperative strategy adaptationin opportunistic mobile networks

S Misra, S Pal, BK Saha - IEEE Transactions on Parallel and …, 2014 - ieeexplore.ieee.org
Cooperation among nodes is a fundamental necessity in opportunistic mobile networks
(OMNs), where the messages are transferred using the store-carry-and-forward mechanism …

Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks

Q Han, H Wen, G Feng, B Wu, M Ren - Peer-to-Peer Networking and …, 2016 - Springer
Security is a critical constraint for the expansion of Peer-to-Peer (P2P) networks. The
autonomy, dynamic and distribution natures benefit both valid and malicious users and also …

A secure routing scheme based on social network analysis in wireless mesh networks

Y Yu, Z Ning, L Guo - Science China. Information Sciences, 2016 - search.proquest.com
As an extension of wireless ad hoc and sensor networks, wireless mesh networks (WMNs)
are employed as an emerging key solution for wireless broadband connectivity …

A lightweight identity authentication method by exploiting network covert channel

H Xie, J Zhao - Peer-to-peer Networking and Applications, 2015 - Springer
The state of art authentication schemes are tightly linked with encryption or crypto systems,
which provides concrete foundations to move towards the concept of access control by …