Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Ant-Based Adaptive Trust Evidence Distribution in MANET
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
OLSR Performance Measurement in a Military Mobile Ad-hoc Network
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Trust based adaptive on demand ad hoc routing protocol
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
IEEE Intelligent Systems
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Designing Secure Wireless Mobile Ad Hoc Networks
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
A Framework for Key Management in Mobile Ad Hoc Networks
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
Semantic constraints for trust transitivity
APCCM '05 Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling - Volume 43
On-demand public-key management for mobile ad hoc networks: Research Articles
Wireless Communications & Mobile Computing - Wireless Network Security
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Why Trust is not Proportional to Risk
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
An Efficient Scheme to Motivate Cooperation in Mobile Ad hoc Networks
ICNS '07 Proceedings of the Third International Conference on Networking and Services
Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks
Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
Performance Evaluation
Trust Derivation and Recommendation Management in a Trust Model
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
TSR: trust-based secure MANET routing using HMMs
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 02
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Computing with Social Trust
Future trust management framework for mobile ad hoc networks
IEEE Communications Magazine
Information theoretic framework of trust modeling and evaluation for ad hoc networks
IEEE Journal on Selected Areas in Communications
Editorial: Special issue on trusted computing and communications
Journal of Network and Computer Applications
Journal of Network and Computer Applications
An Exposition of Performance-Security Trade-offs in RANETs Based on Quantitative Network Models
Wireless Personal Communications: An International Journal
Composite trust-based public key management in mobile ad hoc networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
A survey of intrusion detection techniques for cyber-physical systems
ACM Computing Surveys (CSUR)
Generating trusted graphs for trust evaluation in online social networks
Future Generation Computer Systems
Hi-index | 0.00 |
We develop and analyze a trust management protocol for mission-driven group communication systems in mobile ad hoc networks using hierarchical modeling techniques based on stochastic Petri nets. Trust among mobile nodes is crucial for team collaborations with new coalition partners without prior interactions for mission-driven group communication systems in battlefield situations. In addition, ensuring a certain level of trust is also critical for successful mission completion. Our work seeks to identify the optimal length of a trust chain among peers in a trust web that generates the most accurate trust levels without revealing risk based on a tradeoff between trust availability and path reliability over trust space. We define a trust metric for mission-driven group communication systems in mobile ad hoc networks to properly reflect unique characteristics of trust concepts and demonstrate that an optimal trust chain length exists for generating the most accurate trust levels for trust-based collaboration among peers in mobile ad hoc networks while meeting trust availability and path reliability requirements.