2011
DOI: 10.1016/j.comnet.2010.11.010
|View full text |Cite
|
Sign up to set email alerts
|

OREN: Optimal revocations in ephemeral networks

Abstract: a b s t r a c tPublic-key certificates allow a multitude of entities to securely exchange and verify the authenticity of data. However, the ability to effectively revoke compromised or untrustworthy certificates is of great importance when coping with misbehavior. In this paper, we design a fully distributed local certificate revocation scheme for ephemeral networks -a class of extremely volatile wireless networks with short-duration and short-range communications -based on a game-theoretic approach. First, by… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 16 publications
0
22
0
Order By: Relevance
“…They use a cost game as they want to model the incentive and stimulate cooperation between benign nodes against one malicious node. In [Bilogrevic et al 2010] and [Reidt et al 2009], the authors model the rewards of agents by including self-sacrifice benefits to payoff calculations.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…They use a cost game as they want to model the incentive and stimulate cooperation between benign nodes against one malicious node. In [Bilogrevic et al 2010] and [Reidt et al 2009], the authors model the rewards of agents by including self-sacrifice benefits to payoff calculations.…”
Section: Discussionmentioning
confidence: 99%
“…Then we address security protocols that are designed for mobile networks, using a game-theoretic approach [Raya et al 2008;Reidt et al 2009;Bilogrevic et al 2010]. In the literature reviewed below, the authors first define the security problems that are solved by the active participation of mobile nodes.…”
Section: Security In Self-organizing Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…In general, from a capacity point of view, it would be more advantageous to adopt a broad-band approach. It is worthwhile to research OFDMA approach, treating the 70-MHz spectrum as a single channel, which might produce more improvement than treating it as seven separate channels [14][15][16]. Such an approach may increase the DSP complexity by requiring faster data converters and processors.…”
Section: Fig 6 Papr Reduction Of Ofdm Signals By Tr Methodsmentioning
confidence: 99%
“…Another proposal uses a game-theoretic revocation approach to define the best strategy for each individual vehicle [5,27]. These mechanisms provide incentives to guarantee the successful revocation of the malicious nodes.…”
Section: Decentralized Revocation Approachesmentioning
confidence: 99%