2011 7th International Wireless Communications and Mobile Computing Conference 2011
DOI: 10.1109/iwcmc.2011.5982529
|View full text |Cite
|
Sign up to set email alerts
|

A reputation management model using ID based cryptosystem in overlay networks

Abstract: Dealing with malicious nodes is an important issue for many types of overlay networks. In overlay networks, malicious nodes can drop, delay or in other ways subvert user traffic, modify packets and break protocols required for the successful operation of the system. We propose a reputation management model supported by an ID based cryptosystem to reveal a malicious node with the aid of altruistic legitimate nodes who wish to identify a malicious node. We propose a deterrent structure using simple mathematical … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 10 publications
0
0
0
Order By: Relevance