Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Short Signatures from the Weil Pairing
Journal of Cryptology
Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Decentralized trust management for ad-hoc peer-to-peer networks
Proceedings of the 4th international workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006)
A survey of trust and reputation systems for online service provision
Decision Support Systems
Security for Telecommunications Networks
Security for Telecommunications Networks
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
Trust Management in Emergency Networks
AINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications
Architecture and algorithms for a distributed reputation system
iTrust'03 Proceedings of the 1st international conference on Trust management
General packet radio service in GSM
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
Foreword: Special issue foreword: Advances in pervasive computing systems and applications
Journal of Computer and System Sciences
Journal of Computer and System Sciences
Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems
Journal of Computer and System Sciences
Hi-index | 0.00 |
We study the unique trust management, and more precisely reputation management and revocation of malicious nodes in the context of ad hoc networks used for emergency communications. Unlike in centralized systems, reputation management and revocation in ad hoc networks is non-trivial. This difficulty is due to the fact that the nodes have to collaboratively calculate the reputation value of a particular node and then revoke the node if the reputation value goes below a threshold. A major challenge in this scheme is to prevent a malicious node from discrediting other genuine nodes. The decision to revoke a node has to be communicated to all the nodes of the network. In traditional ad hoc networks the overhead of broadcasting the message throughout the network may be very high. We solve the problem of reputation management and node revocation in ad hoc networks of cell phones by using a threshold cryptography based scheme. Each node of the network would have a set of anonymous referees, which would store the reputation information of the node and issue reputation certificates to the node with timestamps. The misbehavior of a particular cell phone is reported to its anonymous referees, who issue certificates which reflect the positive and negative recommendations.