dc.relation | [1] M. Van Steen and A. S. Tanenmabum. Distributed Systems, vol. 01. 2017.
[2] P. Brody and V. Pureswaran, “Device democracy: Saving the future of the Internet of Things IBM,” IBM Glob. Bus. Serv. Exec. Rep., 2015, [Online]. Available: http://m2mworldnews.com/download/white-papers/IBM-Saving-the-future-of-IoT.pdf.
[3] Ericsson, “Mobility Report,” White Pap., no. May, pp. 7–8, 2016, doi: 10.3103/S0005105510050031.
[4] R. Helmus and J. Grabenhofer, “TURNING THE INTERNET OF THINGS INTO REALITY: A practical approach to your unique IoT journey,” p. 30, 2019, [Online]. Available: https://assets.new.siemens.com/siemens/assets/api/uuid:131ac2f9-5e8b-4968-ba2f-734eefccdb50/version:1556633115/turning-iot-into-reality-whitepaper-by-siemens-iot-services-fina.pdf.
[5] E. M. Royer and C.-K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks,” Pers. Commun. IEEE, vol. 6, no. 2, pp. 46–55, 1999, doi: 10.1109/98.760423.
[6] S. R. Surya and G. A. Magrica, “A survey on wireless networks attacks,” in 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), Feb. 2017, pp. 240–247, doi: 10.1109/ICCCT2.2017.7972278.
[7] K. Shcwab, The Fourth Industrial Revolution, no. 1. CH-1223 Cologny/Geneva: World Economic Forum, 2016.
[8] D. O. M. Thomas W. Edgar, Research Methods for Cyber Security. 2017.
[9] I. E. T. Force, “RFC 4949 Internet Engineering Task Force,” RFC 4949, 2007.
[10] C. C. C. Chigan and R. Bandaru, “Secure node misbehaviors in mobile ad hoc networks,” IEEE 60th Veh. Technol. Conf. 2004. VTC2004-Fall. 2004, vol. 7, pp. 4730–4734, 2004, doi: 10.1109/VETECF.2004.1404990.
[11] J. E. Ortiz-Triviñio, H. Zárate-Ceballos, J. F. Sanchez-Cifuentes, and J. P. Ospina-López, “Sistema de Telecomunicaciones Social-Inspirado mediante Comunidades de Agentes,” Cicom, p. 1, 2015.
[12] J. P. Ospina-López and J. E. Ortiz-Triviñio, “Characterization of a cluster and its resources in an Ad-Hoc network starting from the truncated geometric distribution,” ITECKNE Innovación e Investig. en Ing., vol. 12, no. 1, pp. 68–75, 2015.
[13] H. Zárate Ceballos, “Diseño de un Sub-Sistema de Cómputo Distribuido que permita implementar virtualización inalámbrica para gestionar recursos (Procesamiento, memoria, almacenamiento y dispositivos E/S) distribuidos en una Red Ad Hoc, mediante el modelo de pseudo Esta,” 2018.
[14] J. P. O. López, H. Z. Ceballos, and J. E. O. Triviño, “Scalability in ad hoc networks under hierarchical architectures,” 2015 IEEE Colomb. Conf. Commun. Comput. COLCOM 2015 - Conf. Proc., 2015, doi: 10.1109/ColComCon.2015.7152087.
[15] J. Alexander and J. E. Ortiz, “Diseñ o Socio-inspirado de la M á quina Virtual Distribuida ( Ö rbis Virt ü alis Maqüinus Ö VM ) para la red Ad-Hoc TL Ö N,” no. 45.
[16] J. P. Ospina-López and J. E. Ortiz-Triviño, “Estimation of a Growth Factor to Achieve Scalable ad hoc Networks,” Ing. Univ., vol. 21, no. 1, pp. 49–70, 2017, doi: 10.11144/ Javeriana.iyu21-1.egfa.
[17] J. F. Sánchez, J. P. Ospina, J. E. Gonzalez, and J. E. Ortiz, “Sociability as a decision model for artificial agents,” pp. 1–8, 2017.
[18] C. A. Gomez and J. E. Ortiz, “A greener method for content sharing in mobile ad hoc networks,” in 2010 IEEE Latin-American Conference on Communications, Sep. 2010, pp. 1–6, doi: 10.1109/LATINCOM.2010.5640998.
[19] J. E. P. Amaris, A. C. C. Hurtado, and J. E. O. Trivino, “Bacteria agent colony inside an ad-hoc network,” 2015 10th Comput. Colomb. Conf., pp. 347–350, 2015, doi: 10.1109/ColumbianCC.2015.7333444.
[20] F. Téllez and J. Ortiz, “Behavior of Elliptic Curve Cryptosystems for the Wormhole Intrusion in MANET : A Survey and Analysis,” J. Comput. Sci., vol. 11, no. 9, pp. 1–12, 2011.
[21] TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos, “TLÖN - Grupo de Investigación en Redes de Telecomunicaciones Dinámicas y Lenguajes de Programación Distribuidos,” 2020, 2020. http://tlon.unal.edu.co/.
[22] Z. Henry, J. Eduardo, and O. Triviño, “S . O . V . O . R . A .: A Distributed Wireless,” 2020.
[23] F. Ahmed, S. Robinson, and A. A. Tako, “Using the structred analysis and design technique (SADT) in simulation conceptual modeling,” in Proceedings of the Winter Simulation Conference 2014, Dec. 2014, no. 1983, pp. 1038–1049, doi: 10.1109/WSC.2014.7019963.
[24] D. D. Clark and D. R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” pp. 184–184, 2015, doi: 10.1109/sp.1987.10001.
[25] F. Edition, CISSP: The Official (ISC)2 CISSP CBK Reference. 2019.
[26] S. Beissel, Cybersecurity Investments. 2016.
[27] M. M. Alani, “MANET security: A survey,” Proc. - 4th IEEE Int. Conf. Control Syst. Comput. Eng. ICCSCE 2014, no. November, pp. 559–564, 2014, doi: 10.1109/ICCSCE.2014.7072781.
[28] ISO, “SO/IEC27001,” Int. Organ. Stand., vol. 27001, 2013.
[29] ISO, “ISO/IEC 27002 2013,” Internation Organization for Standardization. 2013.
[30] NIST, “Framework for Improving Critical Infrastructure Cybersecurity,” 2018, doi: 10.6028/NIST.CSWP.04162018.
[31] ISACA, COBIT 5. 2012.
[32] I. Response, “Security Leadership Five Keys for Building a Five Keys for Building a Cybersecurity Program.”
[33] Common Criteria, “Common Methodology for Information Technology Security Evaluation Evaluation methodology April 2017 Revision 5 Foreword,” Common Criteria, no. April, 2017.
[34] T. Hobbes, El Leviatán. 1651.
[35] The Open Group, “The TOGAF® Standard, Version 9.2.” .
[36] John Zachman, “About the Zachman Framework.” .
[37] “Open Security Architecture.” http://www.opensecurityarchitecture.org/cms/.
[38] “SABSA Executive Summary - The SABSA Institute.” https://sabsa.org/sabsa-executive-summary/.
[39] J. Sherwood, A. Clark, and D. Lynas, Enterprise security architecture a business-driven approach, vol. 21, no. 4. 2005.
[40] Serge Haddad Fabrice Kordon Laurent Pautet Laure Petrucci, Distributed Systems: Design and algorithms, vol. 28, no. 11. John Wiley & Sons, Inc., 2011.
[41] R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. 2008.
[42] D. Harinath, P. Satyanarayana, and M. V. R. Murthy, “A Review on Security Issues and Attacks in Distributed Systems,” J. Adv. Inf. Technol., vol. 8, no. 1, pp. 1–9, 2017, doi: 10.12720/jait.8.1.1-9.
[43] S. Gilbert and N. Lynch, “Perspectives on the CAP Theorem,” Computer (Long. Beach. Calif)., vol. 45, no. 2, pp. 30–36, 2012, doi: 10.1109/mc.2011.389.
[44] S. M. Specht and R. B. Lee, “Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures,” Int. Work. Secur. Parallel Distrib. Syst., no. 9, pp. 543–550, 2004, doi: 10.1.1.133.4566.
[45] V. Krasnoproshin and T. Galibus, “Conceptual distributed system models and organization of security mechanisms,” Proc. 2015 IEEE 8th Int. Conf. Intell. Data Acquis. Adv. Comput. Syst. Technol. Appl. IDAACS 2015, vol. 1, no. September, pp. 432–435, 2015, doi: 10.1109/IDAACS.2015.7340773.
[46] M. D. Vijay Prakash, “A Review on Security Issues in Distributed Systems,” in International Journal of Scientific & Engineering Research, Volume 3,., vol. 3, no. 9, International Journal of Scientific & Engineering Research Volume 3, Issue 9, September-2012, 2012.
[47] V. Hoa La and A. Cavalli, “Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey,” Int. J. AdHoc Netw. Syst., vol. 4, no. 2, pp. 1–20, Apr. 2014, doi: 10.5121/ijans.2014.4201.
[48] M. Mauve, J. Widmer, and H. Hartenstein, “A survey on position-based routing in mobile ad hoc networks,” Network, IEEE, vol. 15, no. 6, pp. 30–39, 2001, doi: 10.1109/65.967595.
[49] I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile ad hoc networking: Imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, 2003, doi: 10.1016/S1570-8705(03)00013-1.
[50] D. Djenouri, L. Khelladi, and a N. Badache, “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Commun. Surv. Tutorials, vol. 7, no. 4, pp. 2–28, 2005, doi: 10.1109/COMST.2005.1593277.
[51] I. Akyildiz and X. Wang, “A survey on wireless mesh networks,” Commun. Mag. IEEE, no. September, pp. 23–30, 2005, doi: 10.1109/MCOM.2005.1509968.
[52] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: A survey,” Comput. Networks, vol. 47, no. 4, pp. 445–487, 2005, doi: 10.1016/j.comnet.2004.12.001.
[53] J. Usmani, R. Kumar, and J. Prakash, “A survey on secure gateway discovery in MANET,” in 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence, Jan. 2017, pp. 362–368, doi: 10.1109/CONFLUENCE.2017.7943176.
[54] P. R. . Arun Kumar. R, Abhishek M. K, Tejashwini. A. I, Niranjan J. T, “A Review on Intrusion Detection Systems in MANET,” Int. J. Eng. Sci. Innov. Technol. Vol. 2, Issue 2, March 2013, vol. 2, no. 2, pp. 453–459, 2013, [Online]. Available: http://www.ijesit.com/Volume 2/Issue 2/IJESIT201302_96.pdf.
[55] L. Abusalah, A. Khokhar, and M. Guizani, “A survey of secure mobile Ad Hoc routing protocols,” IEEE Commun. Surv. Tutorials, vol. 10, no. 4, pp. 78–93, 2008, doi: 10.1109/SURV.2008.080407.
[56] L. Zhou and Z. J. Hass, “Securing Ad Hoc Networks,” IEEE Netw., vol. 13, no. 6, pp. 24–30, 1999, doi: 10.1109/65.806983.
[57] E. Alotaibi and B. Mukherjee, “A survey on routing algorithms for wireless Ad-Hoc and mesh networks,” Comput. Networks, vol. 56, no. 2, pp. 940–965, 2012, doi: 10.1016/j.comnet.2011.10.011.
[58] I. Bekmezci, O. K. Sahingoz, and Ş. Temel, “Flying Ad-Hoc Networks (FANETs): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270, 2013, doi: 10.1016/j.adhoc.2012.12.004.
[59] S. Aluvala, K. R. Sekhar, and D. Vodnala, “An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks,” Procedia Comput. Sci., vol. 92, pp. 554–561, 2016, doi: 10.1016/j.procs.2016.07.382.
[60] Congzhe Zhang, MengChu Zhou1, and Ming Yu, “Ad hoc network routing and security: A review,” Int. J. Commun. Syst., vol. 20, no. 8, pp. 909–925, 2007, doi: 10.1002/dac.840.
[61] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” Wirel. Commun. IEEE, vol. 11, no. February, pp. 38–47, 2004, doi: 10.1109/MWC.2004.1269716.
[62] A. Dorri and S. R. Kamel, “Security Challenges in Mobile Ad Hoc Networks: A Survey,” Int. J. Comput. Sci. Eng. Surv., vol. 6, no. 1, pp. 15–29, 2015, doi: 10.5121/ijcses.2015.6102.
[63] S. Jain, “Security Threats in Manets: A Review,” Int. J. Inf. Theory, vol. 3, no. 2, pp. 37–50, Apr. 2014, doi: 10.5121/ijit.2014.3204.
[64] A. K. Abdelaziz, M. Nafaa, and G. Salim, “Survey of routing attacks and countermeasures in mobile ad hoc networks,” Proc. - UKSim 15th Int. Conf. Comput. Model. Simulation, UKSim 2013, pp. 693–698, 2013, doi: 10.1109/UKSim.2013.48.
[65] E. Amiri, H. Keshavarz, H. Heidari, E. Mohamadi, and H. Moradzadeh, “Intrusion Detection Systems in MANET: A Review,” Procedia - Soc. Behav. Sci., vol. 129, pp. 453–459, 2014, doi: 10.1016/j.sbspro.2014.03.700.
[66] O. Rodas, M. A. To, J. Alvarez, and S. Maag, “Protecting Wireless Mesh Networks through a distributed intrusion prevention framework,” 2015 7th IEEE Latin-American Conf. Commun. LATINCOM 2015, pp. 1–6, 2016, doi: 10.1109/LATINCOM.2015.7430126.
[67] J. A. Goncalves, V. S. Faria, G. B. Vieira, C. A. M. Silva, and D. M. Mascarenhas, “WIDIP: Wireless distributed IPS for DDoS attacks,” 2017 1st Cyber Secur. Netw. Conf. CSNet 2017, vol. 2017-Janua, pp. 1–3, 2017, doi: 10.1109/CSNET.2017.8241996.
[68] M. Buvaneswari and T. Subha, “IHoneycol: A distributed collaborative approach for mitigation of DDoS attack,” 2013 Int. Conf. Inf. Commun. Embed. Syst. ICICES 2013, pp. 340–345, 2013, doi: 10.1109/ICICES.2013.6508281.
[69] R. P. Foundation, “Raspberry Pi,” 2021, 2021. https://www.raspberrypi.org/about/.
[70] Open Mesh, “BATMAN - Adv. Protocol concept,” 2021. https://www.open-mesh.org/projects/batman-adv/wiki/Protocol_information.
[71] O. Mesh, “Open Mesh - Batman Adv. Routing scenarios,” 2021. https://www.open-mesh.org/doc/open-mesh/Routing_scenarios.html.
[72] OpenMesh, “ALFRED,” 2021. https://www.open-mesh.org/projects/alfred/wiki.
[73] Linux Foundation, “Linux Netem,” 2021. https://wiki.linuxfoundation.org/networking/netem#how_can_i_use_netem_on_incoming_traffic.
[74] Avahi, “Avahi,” 2021. https://www.avahi.org/.
[75] Docker, “Docker,” 2021. https://www.docker.com/resources/what-container.
[76] Python Foundation, “Python,” 2021. https://www.python.org/about/.
[77] M. Kumar, A. J. Kulkarni, and S. C. Satapathy, “Socio evolution & learning optimization algorithm: A socio-inspired optimization methodology,” Futur. Gener. Comput. Syst., vol. 81, pp. 252–272, 2018, doi: 10.1016/j.future.2017.10.052.
[78] J. Zhang, W. Wang, F. Xia, Y. R. Lin, and H. Tong, “Data-Driven Computational Social Science: A Survey,” Big Data Res., vol. 21, pp. 1–28, 2020, doi: 10.1016/j.bdr.2020.100145.
[79] J. F. L. Ochoa, “Compromiso y simpatía: emotividad en la toma de decisiones cooperativas en redes estocásticas de siguiente generación,” 2017, [Online]. Available: http://bdigital.unal.edu.co/59415/.
[80] H. Nunoo-Mensah, K. O. Boateng, and J. D. Gadze, “The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: A survey,” Int. J. Commun. Syst., vol. 31, no. 7, pp. 1–18, 2018, doi: 10.1002/dac.3444.
[81] H. Yu, Z. Shen, C. Leung, C. Miao, and V. R. Lesser, “A survey of multi-Agent trust management systems,” IEEE Access, vol. 1, no. January 2014, pp. 35–50, 2013, doi: 10.1109/ACCESS.2013.2259892.
[82] A. Ferrario, M. Loi, and E. Viganò, “In AI We Trust Incrementally: a Multi-layer Model of Trust to Analyze Human-Artificial Intelligence Interactions,” Philos. Technol., vol. 33, no. 3, pp. 523–539, 2020, doi: 10.1007/s13347-019-00378-3.
[83] J.-H. Cho, A. Swami, and I.-R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Commun. Surv. Tutorials Tutorials, vol. 13, no. 4, pp. 562–583, 2011, doi: 10.1109/SURV.2011.092110.00088.
[84] M. Poulshock, “The Foundations of Political Realism,” pp. 1–33, Oct. 2019, doi: 10.7312/burg93494.
[85] W. Long, “Escaping the State of Nature: A Hobbesian Approach to Cooperation in Multi-agent Reinforcement Learning,” J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689–1699, Jun. 2019, doi: 10.1017/CBO9781107415324.004.
[86] R. Ross, M. McEvilley, and J. C. Oren, “NIST Special Publication 800-160 Volume 1 - Systems security engineering: considerations for a multidisciplinary approach in the engineering of trustworthy secure systems, volume 1,” NIST Spec. Publ., vol. 1, 2018, [Online]. Available: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v1.pdf.
[87] E. Cayirci and C. Rong, Security in Wireless Ad Hoc and Sensor Networks, 1st ed. Chippenham: Wiley Publishing, Inc., 2009.
[88] O. A. A. Elahe Fazeldehkordi, I.S. Amiri, A Study of Black Hole Attack Solutions, vol. 4333, no. March. 2016.
[89] OpenMesh, “JOKER,” 2021. https://www.open-mesh.org/doc/open-mesh/Joker.html.
[90] H. Zárate Ceballos, “Diseño de un Sub-Sistema de Cómputo Distribuido que permita implementar virtualización inalámbrica para gestionar recursos (Procesamiento, memoria, almacenamiento y dispositivos E/S) distribuidos en una Red Ad Hoc, mediante el modelo de pseudo Esta,” 2018.
[91] P. Bowen, J. Hash, and M. Wilson, “Information Security Handbook: A Guide for Managers NIST Special Publication 800-100,” NIST Spec. Publ. 800-100, no. October, p. 137, 2006, [Online]. Available: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-100.pdf.
[92] G. Boella, L. van der Torre, and H. Verhagen, “Introduction to normative multiagent systems,” Comput. Math. Organ. Theory, vol. 12, no. 2-3 SPEC. ISS., pp. 71–79, 2006, doi: 10.1007/s10588-006-9537-7.
[93] E. Aizenberg and J. van den Hoven, “Designing for human rights in AI,” Big Data Soc., vol. 7, no. 2, pp. 1–30, 2020, doi: 10.1177/2053951720949566.
[94] S. Tomic, F. Pecora, and A. Saffiotti, “Norms , Institutions , and Robots,” vol. 14, no. 8, pp. 1–12, 2015.
[95] “Construcción de un módulo de seguridad Informática en el sistema TLÖN que permita tener características de disponibilidad,” Universidad Nacional de Colombia, 2019.
[96] A. C. & D. L. John Sherwood, “White Paper - Enterprise Security Architecture,” SABSA, pp. 1–25.
[97] A. Checa, “Diseño de un mecanismo de clustering en redes ad hoc para sistemas distribuidos en el contexto del sistema TLÖN,” Repositorio.Unal.Edu.Co, 2019, [Online]. Available: https://repositorio.unal.edu.co/handle/unal/77382.
[98] J. F. Sanchez Cifuentes, “Prototipo de un lenguaje de programación para la implementación de servicios a través de comunidades de agentes social inspirados sobre redes Ad-hoc,” 2018.
[99] “Open Mesh BATMAN.” https://www.open-mesh.org/doc/batman-adv/index.html.
[100] R. Dilli and P. C. S. Reddy, “Implementation of security features in MANETs using SHA-3 standard algorithm,” in 2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016, 2016, pp. 455–458, doi: 10.1109/CSITSS.2016.7779410.
[101] J. Granatyr, V. Botelho, O. R. Lessing, E. E. Scalabrin, J. P. Barthes, and F. Enembreck, “Trust and reputation models for multiagent systems,” ACM Comput. Surv., vol. 48, no. 2, 2015, doi: 10.1145/2816826.
[102] N. Dhieb, H. Ghazzai, H. Besbes, Y. Massoud, “Scalable and Secure Architecture for DistributedIoT Systems,” 2020 IEEE Technology & Engineering Management Conference (TEMSCON), 2020, doi: 10.1109/TEMSCON47658.2020.9140108. | |