2010 - Milcom 2010 Military Communications Conference 2010
DOI: 10.1109/milcom.2010.5680086
|View full text |Cite
|
Sign up to set email alerts
|

Trust establishment in cooperative wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(25 citation statements)
references
References 17 publications
0
25
0
Order By: Relevance
“…In wireless networks that contain one or multiple inherently trusted nodes the usual approach is to employ these trusted nodes as authentication servers that distribute keys (or certificates) to other nodes in order to establish and manage trust relationships among them [3]- [10]. In networks that do not contain any inherently trusted nodes, trust is primarily quantified using trust metrics that are evaluated through nodes interacting with and observing the behaviors of each other [11]- [16]. Equipped with the trust metric values, trust relationships among nodes can then be established and maintained via inference [17].…”
Section: Introductionmentioning
confidence: 99%
“…In wireless networks that contain one or multiple inherently trusted nodes the usual approach is to employ these trusted nodes as authentication servers that distribute keys (or certificates) to other nodes in order to establish and manage trust relationships among them [3]- [10]. In networks that do not contain any inherently trusted nodes, trust is primarily quantified using trust metrics that are evaluated through nodes interacting with and observing the behaviors of each other [11]- [16]. Equipped with the trust metric values, trust relationships among nodes can then be established and maintained via inference [17].…”
Section: Introductionmentioning
confidence: 99%
“…The distribution of θ[m] is assumed available at the destination based on the record of misbehavior detections [10]. If this is the case, combining the received signal y d, 2 [m] with y d, 1 [m] is harmful to the signal demodulation at the destiation.…”
Section: System Modelmentioning
confidence: 99%
“…Thus, the maximum number of the received signal points serves as a favorable measure to determine the relaying behavior. Assume that the a priori probability that the relay node behaves cooperatively or maliciously is known at the destination, which can be achieved through the record of the relay behavior [10]. Based on the maximum a posteriori (MAP) criterion, the relay is detected as behaving cooperatively if…”
Section: Noncoherence Detection Of Misbehaving Relaymentioning
confidence: 99%
See 2 more Smart Citations