Search Results - controller based network trust
Search alternatives:
- based network »
- controller »
-
1
Trust formation based on subjective logic and PGP web-of-trust for information sharing in mobile ad-hoc network
Published 2023“…The PGP web-of-trust is suitable method to adopt in mobile ad hoc networks since nodes are communicating based on peer to peer, hence peer recommendation can be use to create trust between peers. …”
Conference paper -
2
Secure Trust Node Acquisition and Access Control for Privacy-Preserving Expertise Trust in WBAN Networks
Published 2025“…medical information and provide user-type-based security. Control Modules for WBAN networks. …”
Conference paper -
3
A review on extended role based access control (E-RBAC) model in pervasive computing environment
Published 2023Subjects:Conference paper -
4
Trust aware congestion control mechanism for wireless sensor network
Published 2025“…To address these challenges, a proposed Genetic Algorithm based Trust-Aware Congestion Control (GA-TACC) not only manages congestion under natural circumstances but also considers scenarios where hostile nodes deliberately improve packet delivery. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
Published 2017“…Hence, this paper introduces a scheme based on trust factor which is less recursive and less computationally complex scheme as compared to conventional cryptographic based approaches. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
A routing protocol based on trusted and shortest path selection for mobile ad hoc network
Published 2023Conference paper -
7
TC-enabled and distributed cloud computing access control model
Published 2014Get full text
Get full text
Article -
8
Access control framework in a bring your own device environment
Published 2016“…For proper monitoring of the employee’s mobile device against malware infection on the enterprise network, this study proposes classification of third party cloud application URLs that relies on a predictive trust model. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET
Published 2019“…Therefore, a novel secure trust-based architecture that utilizes blockchain technology has been proposed to increase security and privacy to mitigate the aforementioned MAC layer attacks. …”
Get full text
Get full text
Get full text
Article -
11
STCM: secured trust-based communication method in vulnerable mobile adhoc network
Published 2016“…Hence,this paper introduces a scheme based on trust factor which is less recursive and less computationally complex scheme as compared to conventional cryptographic based approaches. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks
Published 2023“…In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. …”
Conference paper -
13
Secure Mobile Ad-Hoc Network (MANET) Using Trust Feature In Friendship Mechanism
Published 2010“…Mobile ad hoc network comprises autonomous and anonymous node roaming freely without centralize controller to determine the communication path. …”
Get full text
Get full text
Article -
14
-
15
Management, Control And Governance Of Hawala Networks In The Gulf Cooperation Council Region
Published 2016“…Clanbased Organisations and Actor Network Theories were utilised to provide the theoretical base on which a research farmework was built. …”
Get full text
Get full text
Get full text
Article -
16
Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks
Published 2011“…While these attacks are quite damaging in terms of consuming available processing and bandwidth resources, they are easy to conduct against the wireless networks. In this study, we propose two distinct models to prevent wireless DoS and replay attacks based on trust in CP for IEEE 802.11 wireless networks. …”
Get full text
Get full text
Get full text
Article -
17
-
18
CTMF: Context-Aware Trust Management Framework for Internet of Vehicles
Published 2022“…A malicious node can broadcast bogus events to obtain network control. False reports and malicious vehicles render the network unreliable during emergencies. …”
Get full text
Get full text
Article -
19
An authentication mechanism for heterogeneous access control model in MANET emergency rescue mission
Published 2023Conference Paper -
20
Trust contributing factors in mobile learning among Universiti Teknologi MARA students / Norazlinawati Walid
Published 2012“…Three components of factors concerned which are demographic, build trust and sustain trust factors. Two models are adapted and modified which are ‘Build Trust in Learning Network Framework’ and ‘Derived Trust Building Framework’. 19 trust factors and seven demographic factors were used as variable. …”
Get full text
Get full text
Thesis
