Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence created by the previous interactions of entities within a protocol. In this work, we are focusing on the evaluation of trust evidence in ad hoc networks. Because of the dynamic nature of ad hoc networks, trust evidence may be uncertain and incomplete. Also, no preestablished infrastructure can be assumed. The evaluation process is modeled as a path problem on a directed graph, where nodes represent entities, and edges represent trust relations. We give intuitive requirements and discuss design issues for any trust evaluation algorithm. Using the theory of semirings,...
Wireless ad-hoc networks consist of devices communicating with each other without the need for a man...
The evolution and existence of stable trust relations have been studied extensively in the context o...
Distributed ad-hoc networks have become ubiquitous in the current technological framework. Such netw...
An important concept in network security is trust, interpreted as a relation among entities that par...
Within the realm of network security, we interpret the concept of trust as a relation among entities...
An important concept in network security is trust, interpreted as a relation among entities that par...
The performance of distributed networks depends on collaboration among distributed entities. To enha...
With the present need for on the move networking, innovative technologies strive to establish a tech...
In networks without centralized control (e.g. ad-hoc or peer-to-peer networks) the users cannot alwa...
Evaluation of trustworthiness of participating entities is an effective method to stimulate collabor...
Trust is important in Ad-hoc networks because collaboration and cooperation among nodes are critical...
International audienceIn an ad hoc network, trust systems usually rely on both local and remote evid...
The main characteristics of ad hoc networks are the lack of predefined infrastructure and the dynami...
In this paper we propose a distributed trust model for certificate revocation in Adhoc networks. The...
A node in ad hoc network is accountable for routing the packets to neighboring nodes. This evolves t...
Wireless ad-hoc networks consist of devices communicating with each other without the need for a man...
The evolution and existence of stable trust relations have been studied extensively in the context o...
Distributed ad-hoc networks have become ubiquitous in the current technological framework. Such netw...
An important concept in network security is trust, interpreted as a relation among entities that par...
Within the realm of network security, we interpret the concept of trust as a relation among entities...
An important concept in network security is trust, interpreted as a relation among entities that par...
The performance of distributed networks depends on collaboration among distributed entities. To enha...
With the present need for on the move networking, innovative technologies strive to establish a tech...
In networks without centralized control (e.g. ad-hoc or peer-to-peer networks) the users cannot alwa...
Evaluation of trustworthiness of participating entities is an effective method to stimulate collabor...
Trust is important in Ad-hoc networks because collaboration and cooperation among nodes are critical...
International audienceIn an ad hoc network, trust systems usually rely on both local and remote evid...
The main characteristics of ad hoc networks are the lack of predefined infrastructure and the dynami...
In this paper we propose a distributed trust model for certificate revocation in Adhoc networks. The...
A node in ad hoc network is accountable for routing the packets to neighboring nodes. This evolves t...
Wireless ad-hoc networks consist of devices communicating with each other without the need for a man...
The evolution and existence of stable trust relations have been studied extensively in the context o...
Distributed ad-hoc networks have become ubiquitous in the current technological framework. Such netw...