Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Communications of the ACM
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
A Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Towards content trust of web resources
Proceedings of the 15th international conference on World Wide Web
Cooperative packet relaying model for wireless ad hoc networks
Proceedings of the 1st ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing
AINA '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications
Security in Mobile Ad Hoc Networks
IEEE Security and Privacy
Optimal forwarding for wireless ad hoc networks with game theory
International Journal of Autonomous and Adaptive Communications Systems
TRULLO - local trust bootstrapping for ubiquitous devices
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
A survey of secure mobile Ad Hoc routing protocols
IEEE Communications Surveys & Tutorials
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Routing security in wireless ad hoc networks
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Securing wireless ad hoc networks in an untrustworthy open environment is always a challenging problem. Lack of central auditing on security and weak incentive for cooperation among nodes in an open network scenario demand a distributed security management scheme preventing selfish and malicious behaviors. In this paper, we present a security enforcement framework for wireless ad hoc networks. This framework is built upon a hybrid and integrated architecture of trust management and intrusion detection, merging the merits of both to guarantee correct services and guard against security attacks.