Evaluation of trustworthiness of participating entities is an effective method to stimulate collaboration and improve network security in distributed networks. Similar to other security related protocols, trust evaluation is an attractive target for adversaries. Currently, the vulnerabilities of trust evaluation system have not been well understood. In this paper, we present several attacks that can undermine the accuracy of trust evaluation, and then develop defense techniques. Based on our investigation on attacks and defense, we implement a trust evaluation system in ad hoc networks for securing ad hoc routing and assisting malicious node detection. Extensive simulations are performed to illustrate various attacks, the effectiveness of t...
International audienceIn this paper, we propose and evaluate a distributed protocol to manage trust ...
Vehicular Ad-hoc Networks (VANETs) are one of the most important types of networks which are widely ...
Mobile ad hoc networks (MANETs) are particularly vulnerable to attacks from malicious nodes as the r...
The performance of distributed networks depends on collaboration among distributed entities. To enha...
An important concept in network security is trust, interpreted as a relation among entities that par...
Within the realm of network security, we interpret the concept of trust as a relation among entities...
Recently, trust establishment is recognized as an important approach to defend distributed networks,...
The main characteristics of ad hoc networks are the lack of predefined infrastructure and the dynami...
International audienceTrust management is a promising approach to conduct nodes' transactions and es...
An important concept in network security is trust, interpreted as a relation among entities that par...
Trust is important in Ad-hoc networks because collaboration and cooperation among nodes are critical...
International audienceIn an ad hoc network, trust systems usually rely on both local and remote evid...
The performance of distributed networks depends on collaboration among distributed entities. To enha...
The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest ...
Ad hoc networks operate over open environments and are hence vulnerable to a large body of threats. ...
International audienceIn this paper, we propose and evaluate a distributed protocol to manage trust ...
Vehicular Ad-hoc Networks (VANETs) are one of the most important types of networks which are widely ...
Mobile ad hoc networks (MANETs) are particularly vulnerable to attacks from malicious nodes as the r...
The performance of distributed networks depends on collaboration among distributed entities. To enha...
An important concept in network security is trust, interpreted as a relation among entities that par...
Within the realm of network security, we interpret the concept of trust as a relation among entities...
Recently, trust establishment is recognized as an important approach to defend distributed networks,...
The main characteristics of ad hoc networks are the lack of predefined infrastructure and the dynami...
International audienceTrust management is a promising approach to conduct nodes' transactions and es...
An important concept in network security is trust, interpreted as a relation among entities that par...
Trust is important in Ad-hoc networks because collaboration and cooperation among nodes are critical...
International audienceIn an ad hoc network, trust systems usually rely on both local and remote evid...
The performance of distributed networks depends on collaboration among distributed entities. To enha...
The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest ...
Ad hoc networks operate over open environments and are hence vulnerable to a large body of threats. ...
International audienceIn this paper, we propose and evaluate a distributed protocol to manage trust ...
Vehicular Ad-hoc Networks (VANETs) are one of the most important types of networks which are widely ...
Mobile ad hoc networks (MANETs) are particularly vulnerable to attacks from malicious nodes as the r...