NSPW '97 Proceedings of the 1997 workshop on New security paradigms
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Authentication and Payment in Future Mobile Systems
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
The Resurrecting Duckling - What Next?
Revised Papers from the 8th International Workshop on Security Protocols
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Robust threshold DSS signatures
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Key agreement in ad hoc networks
Computer Communications
IEEE Network: The Magazine of Global Internetworking
An authentication framework for hierarchical ad hoc sensor networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Peer-to-Peer Security in Mobile Devices: A User Perspective
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Authentication protocols for ad hoc networks: taxonomy and research issues
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
The Green Card Protocol: An Identification Protocol for Decentralized Systems
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
A framework for seamless service interworking in ad-hoc networks
Computer Communications
IEEE Transactions on Wireless Communications
Critical issues in trust management for mobile ad-hoc networks
IRI'09 Proceedings of the 10th IEEE international conference on Information Reuse & Integration
Anonymity services for multi-agent systems
Web Intelligence and Agent Systems
Building a trusted community for mobile ad hoc networks using friend recommendation
ADHOC-NOW'07 Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks
An efficient certificate authority for ad hoc networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
CLUSMA: a mobile agent based clustering middleware for wireless sensor networks
Proceedings of the 7th International Conference on Frontiers of Information Technology
Trust establishment in ad hoc and sensor networks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
A two-tier intrusion detection system for mobile ad hoc networks – a friend approach
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Adaptive access control in coordination-based mobile agent systems
Software Engineering for Multi-Agent Systems III
Trustworthiness and authentication in ubiquitous computing
Proceedings of the 10th ACM international symposium on Mobility management and wireless access
Hi-index | 0.00 |
In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commercial transactions. After a brief introduction to the ad-hoc networking paradigm we give a survey of various existing models and analyze them in terms of scope and applications. It is concluded that no appropriate and satisfactory model for low-value transactions in ad-hoc networks has been developed to date. Our new model is derived from previous models dealing with trust and security in ad-hoc networks, and does not require devices with strong processors as public-key systems. We base the model on a recommendation and reference protocol that is inspired by human behavior and that is in accordance with the very nature of ad-hoc networks.