PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Świadomość sytuacyjna węzła mobilnej sieci doraźnej

Treść / Zawartość
Identyfikatory
Warianty tytułu
EN
Situational awareness of mobile ad-hoc network nodes for radio reconnaissance systems
Języki publikacji
PL
Abstrakty
PL
W artykule została przedstawiona potrzeba budowania świadomości węzłów w zakresie bezpieczeństwa oraz identyfikacja możliwych rozwiązań dotyczących tej tematyki. Następnie przedstawiono koncepcję mechanizmu budowania świadomości sytuacyjnej węzła oraz jego użycie w mobilnej sieci doraźnej wykorzystywanej w rozpoznaniu elektronicznym.
EN
The article depicts the needs for building the situational awareness of military MANET nodes and identifying of some possible solutions. The authors present novel approach for situational awareness assessment and trust-based mechanisms that increase the efficiency and security of communications in military radio reconnaissance system.
Rocznik
Strony
95--109
Opis fizyczny
Bibliogr. 25 poz., wykr., il.
Twórcy
autor
  • Wojskowa Akademia Techniczna, Wydział Elektroniki, Instytut Telekomunikacji
autor
  • Wojskowa Akademia Techniczna, Wydział Elektroniki, Instytut Telekomunikacji
Bibliografia
  • [1] A. Chari, N. Kasiviswanth, K. Seshadri Ramana, A survey on trust management for mobile ad hoc networks, Int’l Journal of Network Security & Its Appl. (IJNSA), 2, 2, 2010.
  • [2] L. Capra, Towards a Human Trust Model for Mobile Ad-hoc Networks, Dept. of Computer Science, University College London.
  • [3] Jien Kato, Jie Li, Ruidong Li, Future Trust Management Framework for Mobile Ad Hoc Networks, IEEE Comm. Magazine, 2008, 108-114.
  • [4] Audun Josang, Roslan Ismail, The Beta Reputation System, 15th Bled Electronic Commerce Conf., Slovenia, June 17-19, 2002.
  • [5] B. Solhaug, D. Elgesem, K. Stolen, Why Trust is not proportional to Risk?, Proc. 2nd Int’l Conf. on Availability, Reliability and Security, Austria, 10-13 Apr. 2007, 11-18.
  • [6] A. Josang, S. LoPresti, Analyzing the Relationship between Risk and Trust, Proc. 2nd Int’l Conf. Trust Management, LNC S, 2004, 135-145.
  • [7] V. G. Rani, M. Punithavelli, Optimizing On Demand Weight-Based Clustering Using Trust Model for Mobile Ad Hoc Networks, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), 1, 4, December 2010.
  • [8] V. Balakrishnan, U. Kiran Tupakula, P. Lucs, V. Varadharajan, Trust Enhanced Secure Mobile Ad-hoc Network Routing, AINAW ‘07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, vol. 02.
  • [9] Feng Yunfang, Adaptive Trust Management in MANET, 2007 International Conference on Computational Intelligence and Security.
  • [10] Jaydip Sen, Piyali Roy Chowdhury, Indranil Sengupta, A Distributed Trust Mechanism for Mobile Ad Hoc Networks, Ad Hoc and Ubiquitous Computing, ISAUHC'06, International Symposium, IEEE 2006.
  • [11] Tian Junfeng, Du Ruizhong, Ma Xiaoxue, Wang Zixian, A Trust Model of P2P Network Based on Reputation and Risk, World Congress on Software Engineering, IEEE 2009.
  • [12] Mingwu Zhang, Shenglin Zhu, Bo Yang, Wenzheng Zhang, Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments, Third International Conference on Natural Computation, IEEE 2007.
  • [13] Jean-Yves Le Boudec, Sonja Buchegger, Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks), IC /2002/01, January 2002.
  • [14] Jean-Yves Le Boudec, Jochen Mundinger, Analysis of a reputation system for Mobile Ad-Hoc Networks with liars, Performance Evaluation, 65, 2008, 212-226.
  • [15] Jianshu Weng, Zhiqi Shen, Chunyan Miao, Angela Goh Eck Soong, Cyril Leung, How Agents Can Handle Unfair Third-Party Testimonies in Computational Trust Models, IEEE Transactions on Knowledge and Data Engineering, 22, 9, September 2010, 1286-1298.
  • [16] Yanli Yu, Keqiu Li, Yong Zhang, Lianpeng Xu, A Service Trust Model with Passive Trust, 2008 IFIP International Conference on Network and Parallel Computing, IEEE 2008.
  • [17] C. Zouridaki, B. L. Mark, M. Hejmo, R. K. Thomas, A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs, In SASN’05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, New York, NY, USA, 2005, 1-10.
  • [18] Asmaa Adnane, Christophe Bidan, Rafael Timoteo de Sousa Junior, Trust-based countermeasures for securing OLSR protocol, 2009 International Conference on Computational Science and Engineering.
  • [19] Mingyu Fan, Xue Liu, Junhai Luo, A trust model based on fuzzy recommendation for mobile ad-hoc networks, Computer Networks, 53, 2009, 2396-2407.
  • [20] G. Shafer, A mathematical theory of evidence, Princeton U.P., Princeton, NJ, 1976.
  • [21] J. Konorski, R. Orlikowski, DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes, Proc. 2nd Joint IFIP WMNC ., Gdansk, Poland, 2009.
  • [22] J. Konorski, R. Orlikowski, Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs, IEEE International Conference on New Technologies, Mobility and Security NTMS 09, Cairo 20-23 December 2009.
  • [23] F. Smarandache, J. Dezert, Advances and Applications of DSmT for Information Fusion, 1, 2004.
  • [24] F. Smarandache, J. Dezert, Advances and Applications of DSmT for Information Fusion, 2, 2006.
  • [25] F. Smarandache, J. Dezert, Advances and Applications of DSmT for Information Fusion, 3, 2009.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-108faa3e-145c-481e-8fc5-c822a2b3aaa8
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.