The official PGP user's guide
Resilient Authentication Using Path Independence
IEEE Transactions on Computers
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Certificate chain discovery in SPKI?SDSI
Journal of Computer Security
Semiring frameworks and algorithms for shortest-distance problems
Journal of Automata, Languages and Combinatorics
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A Practically Implementable and Tractable Delegation Logic
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Parameter estimation for probabilistic finite-state transducers
ACL '02 Proceedings of the 40th Annual Meeting on Association for Computational Linguistics
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Risky trust: risk-based analysis of software systems
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
A quantitative trust establishment framework for reliable data packet delivery in MANETs
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Robust cooperative trust establishment for MANETs
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
On Relating and Integrating Two Trust Management Frameworks
Electronic Notes in Theoretical Computer Science (ENTCS)
A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS
Electronic Notes in Theoretical Computer Science (ENTCS)
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Trust model for certificate revocation in ad hoc networks
Ad Hoc Networks
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Service sharing with trust in pervasive environment: now it's time to break the jinx
Proceedings of the 2008 ACM symposium on Applied computing
Trusting the Trust-Model in mobile wireless ad-hoc network settings
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Trust-based evolutionary game model assisting AODV routing against selfishness
Journal of Network and Computer Applications
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Evaluating Trustworthiness from Past Performances: Interval-Based Approaches
SUM '08 Proceedings of the 2nd international conference on Scalable Uncertainty Management
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
SCLP for Trust Propagation in Small-World Networks
Recent Advances in Constraints
TEREC: Trust Evaluation and Reputation Exchange for Cooperative Intrusion Detection in MANETs
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
A secure mobile healthcare system using trust-based multicast scheme
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
Case study: trust establishment in personal area networks
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
Journal of Systems and Software
Towards Trustworthy Self-optimization for Distributed Systems
SEUS '09 Proceedings of the 7th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems
A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Distributed cooperative transmission with unreliable and untrustworthy relay channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
T2D: a peer to peer trust management system based on disposition to trust
Proceedings of the 2010 ACM Symposium on Applied Computing
A cluster-based trust-aware routing protocol for mobile ad hoc networks
Wireless Networks
Reputation-based role assignment for role-based access control in wireless sensor networks
Computer Communications
Information Sciences: an International Journal
GRAP: Grey risk assessment based on projection in ad hoc networks
Journal of Parallel and Distributed Computing
GREENCOM '11 Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications
Outlier detection using naïve bayes in wireless ad hoc networks
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Rendezvous based trust propagation to enhance distributed network security
International Journal of Security and Networks
Trust establishment in ad hoc and sensor networks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
A dynamic trust model based on naive bayes classifier for ubiquitous environments
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
A process calculus for qos-aware applications
COORDINATION'05 Proceedings of the 7th international conference on Coordination Models and Languages
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
Evaluating trustworthiness from past performances: interval-based approaches
Annals of Mathematics and Artificial Intelligence
Computers & Mathematics with Applications
An approach of trusted program generation for user-responsible privacy
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
Distributed and Parallel Databases
Hi-index | 0.00 |
An important concept in network security is trust, interpreted as a relation among entities that participate in various protocols. Trust relations are based on evidence related to the previous interactions of entities within a protocol. In this work, we are focusing on the evaluation process of trust evidence in Ad Hoc Networks. Because of the dynamic nature of Ad Hoc Networks, trust evidence may be uncertain and incomplete. Also, no pre-established infrastructure can be assumed. The process is formulated as a path problem on a directed graph, where nodes represent entities, and edges represent trust relations. Using the theory of semirings, we show how two nodes can establish an indirect trust relation without previous direct interaction. The results are robust in the presence of attackers. We give intuitive requirements for any trust evaluation algorithm. The performance of the scheme is evaluated on three topologies.