Search Results - controller based network trust

Search alternatives:

Refine Results
  1. 1

    Trust formation based on subjective logic and PGP web-of-trust for information sharing in mobile ad-hoc network by Bakar A.A., Ahmad A.R., Manan J.-L.A., Ismail R.

    Published 2023
    “…The PGP web-of-trust is suitable method to adopt in mobile ad hoc networks since nodes are communicating based on peer to peer, hence peer recommendation can be use to create trust between peers. …”
    Conference paper
  2. 2

    Secure Trust Node Acquisition and Access Control for Privacy-Preserving Expertise Trust in WBAN Networks by Al Barazanchi I.I., Hashim W., Thabit R., Sekhar R., Shah P., Penubadi H.R.

    Published 2025
    “…medical information and provide user-type-based security. Control Modules for WBAN networks. …”
    Conference paper
  3. 3
  4. 4

    Trust aware congestion control mechanism for wireless sensor network by Priscilla, G. Maria, Kumar, B.L. Shiva, Maidin, Siti Sarah, Attarbashi, Zainab

    Published 2025
    “…To address these challenges, a proposed Genetic Algorithm based Trust-Aware Congestion Control (GA-TACC) not only manages congestion under natural circumstances but also considers scenarios where hostile nodes deliberately improve packet delivery. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    STCM: Secured trust-based communication method in vulnerable mobile adhoc network by Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Baba, Asifa Mehraj, Zulkurnain, Nurul Fariza, Lone, Sajad Ahmad

    Published 2017
    “…Hence, this paper introduces a scheme based on trust factor which is less recursive and less computationally complex scheme as compared to conventional cryptographic based approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7
  8. 8

    Access control framework in a bring your own device environment by Morufu, Olalere

    Published 2016
    “…For proper monitoring of the employee’s mobile device against malware infection on the enterprise network, this study proposes classification of third party cloud application URLs that relies on a predictive trust model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET by Adnan Shahid, Khan, Kuhanraj, Balan, Yasir, Javed, Seleviawati, Tarmizi, Johari, Abdullah

    Published 2019
    “…Therefore, a novel secure trust-based architecture that utilizes blockchain technology has been proposed to increase security and privacy to mitigate the aforementioned MAC layer attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    STCM: secured trust-based communication method in vulnerable mobile adhoc network by Khan, Burhan ul Islam, Olanrewaju, Rashidah Funke, Baba, Asifa Mehraj, Zulkurnain, Nurul Fariza, Lone, Sajad Ahmad

    Published 2016
    “…Hence,this paper introduces a scheme based on trust factor which is less recursive and less computationally complex scheme as compared to conventional cryptographic based approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks by Bakar A.A., Ismail R., Ahmad A.R., Abdul Manan J.-L., Jais J.

    Published 2023
    “…In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. …”
    Conference paper
  13. 13

    Secure Mobile Ad-Hoc Network (MANET) Using Trust Feature In Friendship Mechanism by Mohd Tahir, Hatim, Md Dahalin, Zulkhairi, Puteh, Nurnasran, H M, Zabidin, O, Azliza, Md Said, Abas

    Published 2010
    “…Mobile ad hoc network comprises autonomous and anonymous node roaming freely without centralize controller to determine the communication path. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Management, Control And Governance Of Hawala Networks In The Gulf Cooperation Council Region by Sharif, Khurram, Mahama, Habib, Farooqi, Nauman

    Published 2016
    “…Clanbased Organisations and Actor Network Theories were utilised to provide the theoretical base on which a research farmework was built. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks by Malekzadeh, Mina, Abdul Ghani, Abdul Azim, K. Subramaniam, Shamala

    Published 2011
    “…While these attacks are quite damaging in terms of consuming available processing and bandwidth resources, they are easy to conduct against the wireless networks. In this study, we propose two distinct models to prevent wireless DoS and replay attacks based on trust in CP for IEEE 802.11 wireless networks. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    CTMF: Context-Aware Trust Management Framework for Internet of Vehicles by Rehman, A., Hassan, M.F.B., Hooi, Y.K., Qureshi, M.A., Shukla, S., Susanto, E., Rubab, S., Abdel-Aty, A.

    Published 2022
    “…A malicious node can broadcast bogus events to obtain network control. False reports and malicious vehicles render the network unreliable during emergencies. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Trust contributing factors in mobile learning among Universiti Teknologi MARA students / Norazlinawati Walid by Walid, Norazlinawati

    Published 2012
    “…Three components of factors concerned which are demographic, build trust and sustain trust factors. Two models are adapted and modified which are ‘Build Trust in Learning Network Framework’ and ‘Derived Trust Building Framework’. 19 trust factors and seven demographic factors were used as variable. …”
    Get full text
    Get full text
    Thesis