Highly reliable trust establishment scheme in ad hoc networks

Cited 46 time in webofscience Cited 82 time in scopus
  • Hit : 338
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorRen, Kuiko
dc.contributor.authorLi, Tieyanko
dc.contributor.authorWan, Zhiguoko
dc.contributor.authorBao, Fengko
dc.contributor.authorDeng, Robertko
dc.contributor.authorKim, Kwangjoko
dc.date.accessioned2013-03-05T03:43:47Z-
dc.date.available2013-03-05T03:43:47Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2004-08-
dc.identifier.citationCOMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.45, no.6 , pp.687 - 699-
dc.identifier.issn1389-1286-
dc.identifier.urihttp://hdl.handle.net/10203/85332-
dc.description.abstractSecuring ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome this problem, this paper aims at building well established trust relationships in ad hoc networks without relying on any pre-defined assumption. We propose a probabilistic solution based on distributed trust model. A secret dealer is introduced only in the system bootstrapping phase to complement the assumption in trust initialization. With it, much shorter and more robust trust chains are able to be constructed with high probability. A fully self-organized trust establishment approach is then adopted to conform to the dynamic membership changes. The simulation results on both static and dynamic performances show that our scheme is highly resilient to dynamic membership changing and scales well. The lack of initial trust establishment mechanisms in most higher level security solutions (e.g. key management schemes, secure routing protocols) for ad hoc networks makes them benefit from our scheme. (C) 2004 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.publisherELSEVIER SCIENCE BV-
dc.titleHighly reliable trust establishment scheme in ad hoc networks-
dc.typeArticle-
dc.identifier.wosid000223036500001-
dc.identifier.scopusid2-s2.0-3142569233-
dc.type.rimsART-
dc.citation.volume45-
dc.citation.issue6-
dc.citation.beginningpage687-
dc.citation.endingpage699-
dc.citation.publicationnameCOMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING-
dc.identifier.doi10.1016/j.comnet.2004.01.008-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorRen, Kui-
dc.contributor.nonIdAuthorLi, Tieyan-
dc.contributor.nonIdAuthorWan, Zhiguo-
dc.contributor.nonIdAuthorBao, Feng-
dc.contributor.nonIdAuthorDeng, Robert-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorad hoc networks-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthortrust management-
dc.subject.keywordAuthordistributed trust model-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 46 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0