NSPW '97 Proceedings of the 1997 workshop on New security paradigms
A new paradigm for trusted systems
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
PGP: Pretty Good Privacy
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
IEEE Network: The Magazine of Global Internetworking
Dependable Dynamic Source Routing without a trusted third party
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
A quantitative trust establishment framework for reliable data packet delivery in MANETs
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Performance Comparison of Trust-Based Reactive Routing Protocols
IEEE Transactions on Mobile Computing
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Evaluation of multi-radio extensions to AODV for wireless mesh networks
Proceedings of the 4th ACM international workshop on Mobility management and wireless access
Robust cooperative trust establishment for MANETs
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
A software-based trust framework for distributed industrial management systems
Journal of Systems and Software
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Trust model for certificate revocation in ad hoc networks
Ad Hoc Networks
Cryptographic Versus Trust-based Methods for MANET Routing Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
Computer Communications
Performance analysis of multi-radio AODV in hybrid wireless mesh networks
Computer Communications
Cognitive radio network architecture: part II -- trusted network layer structure
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Service sharing with trust in pervasive environment: now it's time to break the jinx
Proceedings of the 2008 ACM symposium on Applied computing
Trusting the Trust-Model in mobile wireless ad-hoc network settings
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
Computer Communications
HOVER: hybrid on-demand distance vector routing for wireless mesh networks
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network
Computational Intelligence and Security
The importance of location on trust in mobile networks
WSEAS TRANSACTIONS on COMMUNICATIONS
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Implementing Decisional Trust: A FIRST APPROACH FOR SMART RELIABLE SYSTEMS
Cybernetics and Systems
DynamicTrust: three-dimensional dynamic computing model of trust in peer-to-peer networks
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
Critical issues in trust management for mobile ad-hoc networks
IRI'09 Proceedings of the 10th IEEE international conference on Information Reuse & Integration
ECGK: An efficient clustering scheme for group key management in MANETs
Computer Communications
A flexible routing decision framework to support diversified application-level data types in MANETs
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Trust algorithms in P2P file sharing networks
International Journal of Internet Technology and Secured Transactions
MPC: mitigating stealthy power control attacks in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Trust based secure routing in AODV routing protocol
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Secured dynamic source routing protocol for mobile sensor networks
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
A cluster-based trust-aware routing protocol for mobile ad hoc networks
Wireless Networks
Secured reactive routing protocol for mobile nodes in sensor networks
WSEAS TRANSACTIONS on COMMUNICATIONS
International Journal of Communication Networks and Distributed Systems
ALARM: an adaptive load-aware routing metric for Hybrid Wireless Mesh Networks
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
A self-destructing file distribution system with feedback for peer-to-peer networks
ACS'09 Proceedings of the 9th WSEAS international conference on Applied computer science
A trust-based IDS for the AODV protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
TrustRings in mobile wireless network settings
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Journal of Network and Computer Applications
Trusted data fusion by using cellular automata in wireless sensor networks
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part I
Trust establishment in ad hoc and sensor networks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Improving IP address autoconfiguration security in MANETs using trust modelling
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
A routing protocol based on trust for MANETs
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Dependable propagating routing information in MANET
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Trust by workflow in autonomic communication
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
Trust management for resilient wireless sensor networks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Analytical models for trust based routing protocols in wireless ad hoc networks
ACM SIGSOFT Software Engineering Notes
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Enforcement of access control policy for mobile ad hoc networks
Proceedings of the Fifth International Conference on Security of Information and Networks
Management and applications of trust in Wireless Sensor Networks: A survey
Journal of Computer and System Sciences
Hi-index | 0.00 |
An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-organized, or spontaneous network. Nodes assist each other by passing data and control packets from one node to another, often beyond the wireless range of the original sender. The execution and survival of an ad-hoc network is solely dependent upon the cooperative and trusting nature of its nodes.However, this naive dependency on intermediate nodes makes the ad-hoc network vulnerable to passive and active attacks by malicious nodes. A number of protocols have been developed to secure ad-hoc networks using cryptographic schemes, but all rely on the presence of an omnipresent, and often omniscient, trust authority. As this paper describes, dependence on a central trust authority is an impractical requirement for ad-hoc networks. We present a model for trust-based communication in ad-hoc networks that also demonstrates that a central trust authority is a superfluous requirement. The model introduces the notion of belief and provides a dynamic measure of reliability and trustworthiness in an ad hoc network.