Distributed low-cost backbone formation for wireless ad hoc networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Efficient Distributed Low-Cost Backbone Formation for Wireless Networks
IEEE Transactions on Parallel and Distributed Systems
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Trust model for certificate revocation in ad hoc networks
Ad Hoc Networks
Advanced Engineering Informatics
Featuring trust and reputation management systems for constrained hardware devices
Proceedings of the 1st international conference on Autonomic computing and communication systems
Subjective logic based trust model for mobile ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
DynamicTrust: three-dimensional dynamic computing model of trust in peer-to-peer networks
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation
An Evolutionary Trust and Distrust Model
Electronic Notes in Theoretical Computer Science (ENTCS)
Securing data through avoidance routing
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
ECGK: An efficient clustering scheme for group key management in MANETs
Computer Communications
A multidimensional reputation scheme for identity federations
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
SensorTrust: A resilient trust model for wireless sensing systems
Pervasive and Mobile Computing
A survey on trust management for intelligent transportation system
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Computational Transportation Science
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
EG-ICE'06 Proceedings of the 13th international conference on Intelligent Computing in Engineering and Architecture
A trust-based routing framework in energy-constrained wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
A dynamic trust model based on naive bayes classifier for ubiquitous environments
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
TARF: a trust-aware routing framework for wireless sensor networks
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
A formal definition for trust in distributed systems
ISC'05 Proceedings of the 8th international conference on Information Security
Towards reliable self-clustering Mobile Ad Hoc Networks
Computers and Electrical Engineering
Exploring the impact of trust information visualization on mobile application usage
Personal and Ubiquitous Computing
Management and applications of trust in Wireless Sensor Networks: A survey
Journal of Computer and System Sciences
Hi-index | 0.00 |
This paper introduces a trust model for mobile ad hocnetworks. Initially each node is assigned a trust level. Thenwe use several approaches to dynamically update trust levelsby using reports from threat detection tools, such as IntrusionDetection Systems (IDSs), located on all nodes inthe network. The nodes neighboring to a node exhibitingsuspicious behavior initiate trust reports. These trust reportsare propagated through the network using one of ourproposed methods. A source node can use the trust levels itestablishes for other nodes to evaluate the security of routesto destination nodes. Using these trust levels as a guide, thesource node can then select a route that meets the securityrequirements of the message to be transmitted. This paperdemonstrates important concepts for establishing a collaborative,dynamic trust model and for using this model asan example to enhance the security of message routing inmobile ad hoc networks.