A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

A survey on trust modeling

JH Cho, K Chan, S Adali - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
The concept of trust and/or trust management has received considerable attention in
engineering research communities as trust is perceived as the basis for decision making in …

PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks

J Zhang, J Cui, H Zhong, Z Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Existing security and identity-based vehicular communication protocols used in Vehicular Ad-
hoc Networks (VANETs) to achieve conditional privacy-preserving mostly rely on an ideal …

A survey on trust management for mobile ad hoc networks

JH Cho, A Swami, R Chen - IEEE communications surveys & …, 2010 - ieeexplore.ieee.org
Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when
collaboration or cooperation is critical to achieving mission and system goals such as …

Intraface

F De la Torre, WS Chu, X Xiong… - 2015 11th IEEE …, 2015 - ieeexplore.ieee.org
Within the last 20 years, there has been an increasing interest in the computer vision
community in automated facial image analysis algorithms. This has been driven by …

[HTML][HTML] Toward a trust evaluation mechanism in the social internet of things

NB Truong, H Lee, B Askwith, GM Lee - Sensors, 2017 - mdpi.com
In the blooming era of the Internet of Things (IoT), trust has been accepted as a vital factor for
provisioning secure, reliable, seamless communications and services. However, a large …

ReTrust: Attack-resistant and lightweight trust management for medical sensor networks

D He, C Chen, S Chan, J Bu… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users
during their everyday lives, at health sites, without restricting their freedom. Establishing trust …

[HTML][HTML] Research communities in cyber security vulnerability assessments: A comprehensive literature review

F Heiding, S Katsikeas, R Lagerström - Computer Science Review, 2023 - Elsevier
Ethical hacking and vulnerability assessments are gaining rapid momentum as academic
fields of study. Still, it is sometimes unclear what research areas are included in the …

Trust management in mobile ad hoc networks using a scalable maturity-based model

PB Velloso, RP Laufer, DO Cunha… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
In this paper, we propose a human-based model which builds a trust relationship between
nodes in an ad hoc network. The trust is based on previous individual experiences and on …

[HTML][HTML] A Trust-Based predictive model for mobile ad hoc network in internet of things

W Alnumay, U Ghosh, P Chatterjee - Sensors, 2019 - mdpi.com
The Internet of things (IoT) is a heterogeneous network of different types of wireless
networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks …