The official PGP user's guide
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Decentralized Trust Management and Accountability in Federated Systems
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9 - Volume 9
Ant-Based Adaptive Trust Evidence Distribution in MANET
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (i)
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
iTrust'05 Proceedings of the Third international conference on Trust Management
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications
Self-policing mobile ad hoc networks by reputation systems
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
The importance of location on trust in mobile networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Hi-index | 0.00 |
Nowadays, the world gets more and more mobile in such a way that communication services are desirable anytime and anywhere. In this context, Mobile wireless ad-hoc networks, including mobile ad-hoc networks (MANETs) and Mesh-Networks, are systems of nodes that interconnect in a dynamical self-organized way providing an attraction especially during mission-crucial or time-crucial applications, for example during a disaster recovery scenario, allowing to extend common Wireless LAN technologies over wide areas. However, the nature of mobile wireless networks makes them very vulnerable to malicious attacks and selfish actions. Principally, due to the absence of pre-established communication infrastructure, security in mobile ad-hoc wireless networks is assumed trickier than in conventional and hierarchical network systems. Unfortunately, traditional and approved security mechanisms are not applicable in such almost anarchistic network structures. Thus, the establishment of Trust is virtually ubiquitous and could lead to a milestone regarding security in mobile wireless ad-hoc networks. In this paper, we compare Trust evaluation, Trust evidence and Trust evidence distribution approaches concerning their applicability to mobile wireless network settings with the aim to figure out which model is truly trustworthy.