Prevention of flooding attacks in mobile ad hoc networks
Proceedings of the International Conference on Advances in Computing, Communication and Control
Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Proceedings of the 2nd international conference on Security of information and networks
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
Computer Standards & Interfaces
Trust management systems for wireless sensor networks: Best practices
Computer Communications
Pollution-resistant peer-to-peer live streaming using trust management
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Cooperation stimulation strategies for peer-to-peer wireless live video-sharing social networks
IEEE Transactions on Image Processing
TRIMS, a privacy-aware trust and reputation model for identity management systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
The pervasive trust foundation for security in next generation networks
Proceedings of the 2010 workshop on New security paradigms
Secure geographic routing in ad hoc and wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on signal processing-assisted protocols and algorithms for cooperating objects and wireless sensor networks
AdContRep: a privacy enhanced reputation system for MANET content services
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Incentivizing responsible networking via introduction-based routing
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
AdChatRep: a reputation system for MANET chatting
Proceedings of 1st international symposium on From digital footprints to social and community intelligence
Trust based fusion over noisy channels through anomaly detection in cognitive radio networks
Proceedings of the 4th international conference on Security of information and networks
Extracting trust information from security system of a service
Journal of Network and Computer Applications
CRM: An efficient trust and reputation model for agent computing
Knowledge-Based Systems
Collaborative service evaluation with the TwoHop trust framework
Security and Communication Networks
TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications
Personal and Ubiquitous Computing
LFTM, linguistic fuzzy trust mechanism for distributed networks
Concurrency and Computation: Practice & Experience
A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks
Wireless Personal Communications: An International Journal
A practical reputation system for pervasive social chatting
Journal of Computer and System Sciences
Security similarity based trust in cyber space
Knowledge-Based Systems
Trustworthy placements: Improving quality and resilience in collaborative attack detection
Computer Networks: The International Journal of Computer and Telecommunications Networking
An Effective Model for Indirect Trust Computation in Pervasive Computing Environment
Wireless Personal Communications: An International Journal
Hi-index | 0.25 |
Establishing trust among distributed network entities has been recognized as a powerful tool to secure distributed networks such as MANETs and sensor networks. Similar to most security schemes, trust establishment methods themselves can be vulnerable to attacks. In this article we investigate the benefits of introducing trust into distributed networks, the vulnerabilities in trust establishment methods, and the defense mechanisms. Five attacks against trust establishment methods are identified, and defense techniques are developed. Effectiveness of the attacks and the defense is demonstrated in the scenarios of securing routing protocols and detecting malicious nodes in MANETs.