2013 IEEE Wireless Communications and Networking Conference (WCNC) 2013
DOI: 10.1109/wcnc.2013.6554931
|View full text |Cite
|
Sign up to set email alerts
|

Integrating trust establishment into routing protocols of today's MANETs

Abstract: Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish extended trust capabilities between devices. The approach of such an anchor of trust in MANETs shows interesting possibilities since no central instances such as Access Points are involved in those networks. The communication between directly connected devices of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
12
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
2
2

Relationship

3
5

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…into memory and reported by the TPM. Protocols like Trusted Network Connect or trusted mobile ad-hoc networks [8] use this feature to continuously or regularly determine the health by checking the software running with reference values.…”
Section: Discussionmentioning
confidence: 99%
“…into memory and reported by the TPM. Protocols like Trusted Network Connect or trusted mobile ad-hoc networks [8] use this feature to continuously or regularly determine the health by checking the software running with reference values.…”
Section: Discussionmentioning
confidence: 99%
“…First steps on the area of TC-based solutions for industrial security are presented in [12] and [13]. Furthermore [14] proposes a central approach for interoperable and secure TC-based device authentication in smart grids using TPMs and TNC.…”
Section: Discussionmentioning
confidence: 99%
“…Other application examples for devices equipped with TPMs can be found in the area of tactical communication [7], calibrated devices [9], network management [5] or future energy networks [6].…”
Section: Use Casesmentioning
confidence: 99%