Preemptive routing in Ad Hoc networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Trust based adaptive on demand ad hoc routing protocol
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
A certificate revocation scheme for wireless ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A Dynamic Trust Model for Mobile Ad Hoc Networks
FTDCS '04 Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Engineering human trust in mobile system collaborations
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Facilitating secure ad hoc service discovery in public environments
Journal of Systems and Software - Special issue: Computer software & applications
Location-based compromise-tolerant security mechanisms for wireless sensor networks
IEEE Journal on Selected Areas in Communications
CellTrust: a reputation model for C2C commerce
Electronic Commerce Research
OREN: Optimal revocations in ephemeral networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Trust models and applications in communication and multi-agent systems
International Journal of Knowledge-based and Intelligent Engineering Systems - Selected papers of KES2012-Part 2 of 2
Hi-index | 0.00 |
In this paper we propose a distributed trust model for certificate revocation in ad hoc networks. The proposed model allows trust to be built over time as the number of interactions between nodes increase. Furthermore, trust in a node is defined not only in terms of its potential for maliciousness, but also in terms of the quality of the service it provides. Trust in nodes where there is little or no history of interactions is determined by recommendations from other nodes. If the nodes in the network are selfish, trust is obtained by an exchange of portfolios. Bayesian networks form the underlying basis for this model.