Swarm intelligence: from natural to artificial systems
Swarm intelligence: from natural to artificial systems
Freenet: a distributed anonymous information storage and retrieval system
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
P-Grid: A Self-Organizing Access Structure for P2P Information Systems
CooplS '01 Proceedings of the 9th International Conference on Cooperative Information Systems
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Anthill: A Framework for the Development of Agent-Based Peer-to-Peer Systems
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Trust Relationships in Secure Systems-A Distributed Authentication Perspective
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Toward acceptable metrics of authentication
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
AntNet: distributed stigmergetic control for communications networks
Journal of Artificial Intelligence Research
Robust cooperative trust establishment for MANETs
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Trusting the Trust-Model in mobile wireless ad-hoc network settings
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
The importance of location on trust in mobile networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Subjective logic based trust model for mobile ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
TrustRings in mobile wireless network settings
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Resilience is more than availability
Proceedings of the 2011 workshop on New security paradigms workshop
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
Towards reliable self-clustering Mobile Ad Hoc Networks
Computers and Electrical Engineering
Hi-index | 0.00 |
Due to the lack of infrastructure and vulnerabilityof wireless links, security in ad hoc networks isconsidered to be much more difficult than intraditional hierarchical networks. Building the trustrelationship between entities is a fundamental problemin ad hoc networks, since the availability of servers,which distribute trust certificates, is not guaranteed.Furthermore, the existence of any trusted server mightnot be assumed either. Therefore, the commonly usedkey distribution center (KDC) and certificationauthority (CA) are not applicable in such highlyautonomous environments. In this paper, we propose ascheme for the distribution of trust certificates, whichis completely distributed and adaptive to mobility. Ourscheme is based on the swarm intelligence paradigm,which has been used for routing both in wired andwireless networks. Our simulations in ns-2 show that itperforms very well in ad hoc environments.