Referee: trust management for Web applications
World Wide Web Journal - Special issue: Web security: a matter of trust
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Child-proof authentication for MIPv6 (CAM)
ACM SIGCOMM Computer Communication Review
LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
PGP: Pretty Good Privacy
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Shared RSA key generation in a mobile ad hoc network
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Key agreement in ad hoc networks
Computer Communications
A service-centric approach to access control and monitoring based on distributed trust
CASCON '07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research
Reputation-based routing in hybrid ad hoc networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Solving soft security problem in MANETs using an evolutionary approach
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
Trust based secure multipath OLSR routing protocol in MANET using fuzzy theory
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Analysing the development of cooperation in MANETs using evolutionary game theory
The Journal of Supercomputing
Impact of trust model on on-demand multi-path routing in mobile ad hoc networks
Computer Communications
Hi-index | 0.00 |
Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Nodes rely on each other to route packets to other mobile nodes or toward stationary nodes that may act as a gateway to a fixed network. Mobile nodes are generally assumed to participate as routers in the mobile wireless network. However, blindly trusting all other nodes to respect the routing protocol exposes the local node to a wide variety of vulnerabilities. Traditional security mechanisms rely on either the authenticated identity of the requesting principal or some form of credentials that authorise the client to perform certain actions. Generally, these mechanisms require some underlying infrastructure, e.g., a public key infrastructure (PKI). However, we cannot assume such infrastructures to be in place in an ad hoc network. In this paper we propose an extension to an existing ad hoc routing protocols, which selects the route based on a local evaluation of the trustworthiness of all known intermediary nodes (routers) on the route to the destination. We have implemented this mechanism in an existing ad hoc routing protocol, and we show how trust can be built from previous experience and how trust can be used to avoid routing packets through unreliable nodes.