Factors Affecting Distributed System Security
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
A group mobility model for ad hoc wireless networks
MSWiM '99 Proceedings of the 2nd ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Handbook of Algorithms for Wireless Networking and Mobile Computing (Chapman & Hall/Crc Computer & Information Science)
MDM '06 Proceedings of the 7th International Conference on Mobile Data Management
Evolution of cooperation in ad hoc networks under game theoretic model
Proceedings of the 4th ACM international workshop on Mobility management and wireless access
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks
ICESS '08 Proceedings of the 2008 International Conference on Embedded Software and Systems
Algorithms and Protocols for Wireless Sensor Networks
Algorithms and Protocols for Wireless Sensor Networks
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
Proceedings of the 2009 IEEE international conference on Communications
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
Distributed and Parallel Databases
Hi-index | 0.00 |
As the use of mobile ad hoc networks spreads beyond personal networks to practical military and commercial applications, addressing security issues becomes extremely important in this area. However, mobile networks are more susceptible to malicious behavior; thus, an effective node evaluation mechanism can prevent malicious nodes from initiating attacks and tampering the data communications process in these networks. In this article, we formalize the node evaluation problem, discuss its challenges, and present possible solutions. Moreover, we propose a novel node evaluation solution with the assistance of trustworthy neighboring nodes, which allows a mobile node to more effectively evaluate its neighbors based on the additional trust information from selected neighboring nodes. Our schemes can thus enhance the security of a network and improve the effectiveness of node evaluation. Finally, we evaluate our node evaluation strategies and analyze their advantages when compared to existing node evaluation mechanisms used in wireless communications.