2009
DOI: 10.1016/j.cose.2008.11.009
|View full text |Cite
|
Sign up to set email alerts
|

Reliable and fully distributed trust model for mobile ad hoc networks

Abstract: SecurityTrust model Trust graphThreshold cryptography a b s t r a c t A mobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in MANETs is compulsory to guarantee a widespread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. Our work aims to provide a fully distributed trust mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0
1

Year Published

2010
2010
2015
2015

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 82 publications
(31 citation statements)
references
References 21 publications
(24 reference statements)
0
30
0
1
Order By: Relevance
“…In [16] the problem identified was the creation of the trusted environment by applying the techniques applied on fixed networks security and trust could not be achieved therefore a fully distributed trust based model was proposed in which ad hoc networks generate and distribute a public key without any fixed mode of transmission. A threshold was also included in the public model so that the malicious nodes cannot get the authorized key from the certification authority.…”
Section: H Fully Distributed Trust Based Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In [16] the problem identified was the creation of the trusted environment by applying the techniques applied on fixed networks security and trust could not be achieved therefore a fully distributed trust based model was proposed in which ad hoc networks generate and distribute a public key without any fixed mode of transmission. A threshold was also included in the public model so that the malicious nodes cannot get the authorized key from the certification authority.…”
Section: H Fully Distributed Trust Based Modelmentioning
confidence: 99%
“…In [16] a fully distributed public secret sharing key trusted model was applied which aimed to maintain a trust relationship in mobile ad hoc networks and prevented the network from the authorization of a malicious nodes without the involvement of any third party. For achieving the objective threshold cryptography was also included in the network.…”
Section: Comparative Analysismentioning
confidence: 99%
“…besides packet forwarding. Omar et al [9] sought to establish a fully distributed trust model based on trust graphs and threshold cryptography.…”
Section: Trust Evaluationmentioning
confidence: 99%
“…It is calculated according to its accumulated observations using the Bayesian inference which adopts Beta distribution. Unlike most trust mechanisms [7][8][9][10][11][12] that focus on trust evaluation without considering performance of the network, we take other two factors (factors of encounter time and mobility) into account. A good network performance can help save nodes' limited resources and prolong the network lifetime, which is very important in MANET.…”
Section: Introductionmentioning
confidence: 99%
“…The legality of these nodes can be guaranteed by the certifications from Certificate Authority (CA). Omar et al introduces a distributed PKI certification system based on Trust Map and Threshold Encryption (Omar, Challal, et al, 2009). Node legality is secured by Certificate Chain.…”
Section: State-of-the-artmentioning
confidence: 99%