Data networks
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Trust based adaptive on demand ad hoc routing protocol
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Engineering human trust in mobile system collaborations
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
IEEE Network: The Magazine of Global Internetworking
Robust cooperative trust establishment for MANETs
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
On the fairness of flow aggregation for denial-of-service resistant QoS in MANETs
QShine '06 Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks
Cryptographic Versus Trust-based Methods for MANET Routing Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Private Information: To Reveal or not to Reveal
ACM Transactions on Information and System Security (TISSEC)
TEREC: Trust Evaluation and Reputation Exchange for Cooperative Intrusion Detection in MANETs
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
Integrating Dirichlet reputation into usage control
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
A secure mobile healthcare system using trust-based multicast scheme
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
Reliable delivery of event data from sensors to actuators in pervasive computing environments
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
INFOCOM'10 Proceedings of the 29th conference on Information communications
Journal of Network and Computer Applications
Point-based trust: define how much privacy is worth
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
A strategic reputation-based mechanism for mobile ad hoc networks
Canadian AI'12 Proceedings of the 25th Canadian conference on Advances in Artificial Intelligence
Trust modeling for message relay control and local action decision making in VANETs
Security and Communication Networks
Requirements and design for neutral trust management framework in unstructured networks
The Journal of Supercomputing
Multimedia Tools and Applications
Hi-index | 0.00 |
In mobile ad hoc networks (MANETs), a source node must rely on other nodes to forward its packets on multi-hop routes to the destination. Secure and reliable handling of packets by the intermediate nodes is difficult to ensure in an ad hoc environment. We propose a trust establishment scheme for MANETs which aims to improve the reliability of packet forwarding over multi-hop routes in the presence of potentially malicious nodes. Each node forms an "opinion" about each of the other nodes based on both first and second-hand observation data collected from the network. The opinion metric can be incorporated into ad hoc routing protocols to achieve reliable packet delivery even when a portion of the network exhibits malicious behavior. We present numerical results which demonstrate the effectiveness of the proposed trust establishment scheme.