2007 IEEE SMC Information Assurance and Security Workshop 2007
DOI: 10.1109/iaw.2007.381918
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Distribution of Trust Authority Functions in Tactical Networks

Abstract: Abstract-In this paper we describe an algorithm for the distribution of trust authority functions such as key generation and distribution in tactical mobile ad hoc networks. Such networks cannot rely on existing infrastructures and must operate under severe resource constraints. Moreover, network partitioning and node failure, including Byzantine failures must be compensated in tactical networks. We propose the combination of metrics on both network state and beliefs or trust in other nodes to form a composite… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 21 publications
(25 reference statements)
0
4
0
Order By: Relevance
“…In addition, there have been lots of work on trust dynamics too including trust prediction [7], [8], propagation [9], [10] and aggregation [10], [11]. These are all important trust and reputation techniques to detect or predict any malicious behaviors and thus enhance the overall security of the network.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, there have been lots of work on trust dynamics too including trust prediction [7], [8], propagation [9], [10] and aggregation [10], [11]. These are all important trust and reputation techniques to detect or predict any malicious behaviors and thus enhance the overall security of the network.…”
Section: Related Workmentioning
confidence: 99%
“…Focusing on the security aspects of tactical ad hoc and mesh networks, a multitude of studies investigated generic [18,78,15,14,51,57,48] and system specific parameters [83,34,16,50,81,35,12]. Zhou and Haas [87] investigated the security requirements of ad hoc networks across military applications.…”
Section: Introductionmentioning
confidence: 99%
“…In this work, we use the terms a node and an entity interchangeably to represent heterogeneous entities (or nodes) above. Military tactical networks typically have a hierarchical structure where a commander makes critical decisions to control all other entities in the network [1]. In this scenario, for the commander, it is critical to perceive an accurate view towards other entities for making right decisions.…”
Section: Introductionmentioning
confidence: 99%
“…GlobalTrust has the following unique contributions: (1) it provides an accurate, consistent view on the reputation of all nodes and detects malicious nodes in the network; (2) it can effectively deal with various attack behaviors; and (3) it outperforms the existing reputation schemes (i.e., two schemes in PeerTrust [3]) in terms of view consistency and resilience against various attack behaviors.…”
Section: Introductionmentioning
confidence: 99%