2008 1st IFIP Wireless Days 2008
DOI: 10.1109/wd.2008.4812860
|View full text |Cite
|
Sign up to set email alerts
|

A distributed trust and reputation model for capacity enhancement in wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2013
2013

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…Level 1 attack requires minimum resources and knowledge, and has less risk levels. Level 2 attack requires exploiting the transport security (between Home Network's HSS and Serving Network's MME), or maliciously using a trusted operator's infrastructure (private key) [14] [15] to gain the HN's HSS trust. Table 2 represents the level 2 attack scenario in SPAN's (Security Protocol ANimator) trace model, and the figure 1 illustrates a SPAN representation of the attack.…”
Section: Riskmentioning
confidence: 99%
“…Level 1 attack requires minimum resources and knowledge, and has less risk levels. Level 2 attack requires exploiting the transport security (between Home Network's HSS and Serving Network's MME), or maliciously using a trusted operator's infrastructure (private key) [14] [15] to gain the HN's HSS trust. Table 2 represents the level 2 attack scenario in SPAN's (Security Protocol ANimator) trace model, and the figure 1 illustrates a SPAN representation of the attack.…”
Section: Riskmentioning
confidence: 99%