Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Authenticated ad hoc routing at the link layer for mobile systems
Wireless Networks
Introduction to the Analysis of the Data Encryption Standard (DES)
Introduction to the Analysis of the Data Encryption Standard (DES)
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Trust in Electronic Commerce: Definition and Theoretical Considerations
HICSS '98 Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences-Volume 4 - Volume 4
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Secure Routing and Intrusion Detection in Ad Hoc Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Requirements and design for neutral trust management framework in unstructured networks
The Journal of Supercomputing
Hi-index | 0.00 |
Mobile Ad-Hoc Networks (MANETs) are adaptive and self-organizing, and as a consequence, securing such networks is non-trivial. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of the participating hosts and the underlying networking system. If MANET is to achieve the same level of acceptance as traditional wired and wireless network infrastructures, then a framework for trust management must become an intrinsic part of its infrastructure. The main goal of this paper is to highlight critical issues that impinge upon trust management and to propose a reputation based approach for establishing trust that dynamically assesses the trustworthiness of the participating nodes in the MANET environment.