Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

Certification-based trust models in mobile ad hoc networks: A survey and taxonomy

M Omar, Y Challal, A Bouabdallah - Journal of Network and Computer …, 2012 - Elsevier
A mobile ad hoc network is a wireless communication network which does not rely on a pre-
existing infrastructure or any centralized management. Securing the exchanges in such …

Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems

FG Mármol, GM Pérez - Computer Standards & Interfaces, 2010 - Elsevier
Different trust and/or reputation models have arisen in the last few years. All of them have
certain key processes in common such as scoring, ranking, rewarding, punishing or …

A novel approach to trust management in unattended wireless sensor networks

Y Ren, VI Zadorozhny, VA Oleshchuk… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of
disconnected operation and fixed or irregular intervals between sink visits. The absence of …

A distributed trust management scheme for data forwarding in satellite DTN emergency communications

P Asuquo, H Cruickshank, CPA Ogah… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Satellite communications can be used when other communication systems are either
destroyed or overloaded. Observation satellites and delay/disruption tolerant networks …

A novel optimally weighted framework of piecewise gamma corrected fractional order masking for satellite image enhancement

H Singh, A Kumar, LK Balyan, GK Singh - Computers & Electrical …, 2019 - Elsevier
A novel image quality enhancement framework is proposed here through a collective
inspiration of the exponential, differential and linear operational behavior of pixel intensities …

Trust-based security for the OLSR routing protocol

A Adnane, C Bidan, RT de Sousa Júnior - Computer Communications, 2013 - Elsevier
The trust is always present implicitly in the protocols based on cooperation, in particular,
between the entities involved in routing operations in Ad hoc networks. Indeed, as the …

Mitigating denial of service attacks in OLSR protocol using fictitious nodes

N Schweitzer, A Stulman, A Shabtai… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
With the main focus of research in routing protocols for Mobile Ad-Hoc Networks (MANET)
geared towards routing efficiency, the resulting protocols tend to be vulnerable to various …

Internet of things: energy consumption and data storage

M Moutaib, M Fattah, Y Farhaoui - Procedia Computer Science, 2020 - Elsevier
Abstract The Internet of Things (IoT) as a growing and fast new technology has recently
attracted attention from around the world. The application of IoT in several areas has showa …

[PDF][PDF] Dynamic Trust Model for Vehicular Cyber-Physical Systems.

H Zhao, D Sun, H Yue, M Zhao, S Cheng - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Trust is a useful model for the interactions of Vehicular Ad Hoc Network (VANET) in
Vehicular Cyber-Physical System (VCPS). Given a dynamic nature in transportation …