Data networks
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
The official PGP user's guide
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Ant-Based Adaptive Trust Evidence Distribution in MANET
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Bandwidth Reservation in Multihop Wireless Networks: Complexity and Mechanisms
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
A Distributed Protocol for Dynamic Address Assignment in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Trust network analysis with subjective logic
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Trusting the Trust-Model in mobile wireless ad-hoc network settings
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
iTrust'05 Proceedings of the Third international conference on Trust Management
Hi-index | 0.00 |
Mobile wireless networks introduce new challenges regarding security and privacy of data. On the other hand self-organization and independence of fixed infrastructure make these networks, such as mobile ad-hoc networks (MANETs) very attractive for military but also civilian application areas. They allow to extend the wireless link into areas with no readily available communication infrastructure. Additionally, these networks can also be used as a subsequent to the common communication environment in order to assure communication on-the-fly even if the regular network is overwhelmed, like for instance during emergency situation or during major sports or cultural events. With the purpose to overcome the security problem accompaingned with these networks, more and more research is launched in the area of Trust establishment in mobile wireless networks. However Trust in mobile network settings introduces new challenges compared to the conventional notions for infrastructure networks. Especially mobile behavior, which is enabled by wireless links, diversifies Trust research in multiple ways. Hence unfortunately, traditional security concepts, such as Public Key Infrastructures are no accurate solutions to protect sensitive communication and data in these autonomous network environments. Our paper discusses the Trust establishment in mobile wireless networks. We introduce the idea of TrustRings which enables the calculation of Trust-Values for nodes in mobile wireless networks based on an egocentric network model. Furthermore, the model takes the location and distance between communicating entities into account in order to obtain the accurate Trust-value.