Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Simulating computer systems: techniques and tools
Simulating computer systems: techniques and tools
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
An approach to certificate path discovery in mobile Ad Hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Why Trust is not Proportional to Risk
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
A calculus of trust and its application to PKI and identity management
Proceedings of the 8th Symposium on Identity and Trust on the Internet
An Identity-based and Threshold Key Management Scheme for Ad Hoc Networks
NSWCTC '09 Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 02
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
Detecting impersonation attacks in future wireless and mobile networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Identity-based key management in mobile ad hoc networks: techniques and applications
IEEE Wireless Communications
Hi-index | 0.00 |
Public key management in mobile ad hoc networks (MANETs) has been studied for several decades. Yet no single solution has completely resolved well known design challenges resulting from the unique characteristics of MANETs. These challenges include no centralized trusted entities, resource constraints, and high security vulnerabilities. This work proposes a fully distributed trust-based public key management approach for MANETs using a soft security mechanism based on the concept of trust. Instead of using hard security approaches, as in traditional security techniques, to eliminate security vulnerabilities, our work aims to maximize performance by trading off risk (i.e., security vulnerability) for trust. In this work, we propose a composite trust-based public key management (CTPKM) with no centralized trust entity with the goal of maximizing performance (e.g., service availability or efficiency) while mitigating security vulnerability. Each node employs a trust threshold to determine whether or not to trust another node. Each node's decision making using the given trust threshold affects performance and security of CTPKM. Our simulation experimental results show that there exists an optimal trust threshold that can best balance and meet the conflicting goals between performance and security, exploiting the inherent tradeoff between trust and risk.