Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks 2006
DOI: 10.1145/1180345.1180349
|View full text |Cite
|
Sign up to set email alerts
|

Robust cooperative trust establishment for MANETs

Abstract: In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastructure in such networks, secure and reliable packet delivery is difficult to achieve. We propose a robust cooperative trust establishment scheme to improve the reliability of packet delivery in MANETs, particularly in the presence of malicious nodes. In the proposed scheme, each node determines the trustworthiness of the other nodes w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 69 publications
(38 citation statements)
references
References 16 publications
0
37
0
Order By: Relevance
“…Hence, a decision logic should be able to output the final result as fast as possible, based on the freshly received reports. This property distinguishes the mechanisms explored in this work from other approaches that rely on a longer history of available reports (e.g., reputation systems [4], [18], [27]). In this section, we are only interested in the decision delay as reports arrive.…”
Section: Evolution In Timementioning
confidence: 99%
See 3 more Smart Citations
“…Hence, a decision logic should be able to output the final result as fast as possible, based on the freshly received reports. This property distinguishes the mechanisms explored in this work from other approaches that rely on a longer history of available reports (e.g., reputation systems [4], [18], [27]). In this section, we are only interested in the decision delay as reports arrive.…”
Section: Evolution In Timementioning
confidence: 99%
“…In the latter, most contributions assume that there is no infrastructure and no PKI; trust is a relation among entities; trust is based on observations, with a history of interactions needed to establish trust. To the best of our knowledge, the computation of trust values in the context of ad hoc networks has been considered in only two cases: certification [7], [25] and routing [4], [27]. Otherwise, trust evaluation assumes the prior establishment of trust relations.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…k is modified whenever we obtain any novel information regarding its trustworthiness in terms of both direct observation results from the node itself and indirect observation results from other nodes. Direct observation results and indirect observation results are generally called first-hand information and second-hand information, respectively [23].…”
Section: Trust Managementmentioning
confidence: 99%