메뉴 건너뛰기




Volumn 6, Issue 3, 2008, Pages 441-457

Trust model for certificate revocation in ad hoc networks

Author keywords

Quality of service; Security; Trust

Indexed keywords

BAYESIAN NETWORKS; MATHEMATICAL MODELS; QUALITY OF SERVICE; SECURITY OF DATA;

EID: 37549026497     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2007.03.005     Document Type: Article
Times cited : (19)

References (22)
  • 1
    • 37549055597 scopus 로고    scopus 로고
    • S. Buchegger, J.Y. Le Boudec, The effect of rumor spreading in reputation systems for mobile ad-hoc networks, in: Proceedings of WiOpt '03, March 2003.
  • 2
    • 37549026998 scopus 로고    scopus 로고
    • Camp Tracy, Boleng Jeff, Davies Vanessa, A survey of mobility models for ad hoc network research, Department of Mathematics and Computer Sciences, Colorado School of Mines, Golden, CO, September 2002. .
  • 3
    • 20344371959 scopus 로고    scopus 로고
    • Capra Licia, Engineering human trust in mobile system collaborations, in: Proceedings of the 12th International Symposium on the Foundations of Software Engineering, 2004, pp. 107-116.
  • 4
    • 4544374484 scopus 로고    scopus 로고
    • Cr'epeau, Claude, R. Davis Carlton, A certificate revocation scheme for wireless Ad hoc networks, in: 1st ACM workshop on Security of ad hoc and sensor networks, 2003, pp. 54-61.
  • 5
    • 0034776383 scopus 로고    scopus 로고
    • T. Goff, N.B. Abu-Ghazaleh, D.S. Phatak, R. Kahvecioglu, Preemptive routing in ad hoc networks, in: Proceedings of the ACM MobiCom, July 2001.
  • 6
    • 84883869163 scopus 로고    scopus 로고
    • Luo Haiyun, P. Zerfos, Kong Jiejun, Lu Songwu, Zhang Lixia, Self-securing ad hoc wireless networks, in: Proceedings IEEE Symposium on Computers and Communications, July 2002, pp 567-574.
  • 7
    • 0001341422 scopus 로고    scopus 로고
    • DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks
    • Perkins C.E. (Ed), Addison-Wesley
    • Johnson D.B., Maltz D.A., and Broch J. DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. In: Perkins C.E. (Ed). Ad Hoc Networking (2001), Addison-Wesley 139-172
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2    Broch, J.3
  • 8
    • 37549023215 scopus 로고    scopus 로고
    • Navid Nikaein, Mobile Ad Hoc Networking & Computing at Eurecom. , 2001.
  • 9
    • 77953097829 scopus 로고    scopus 로고
    • Rajiv K. Nekkanti, Chung-wei Lee, Trust based adaptive on demand ad hoc routing protocol, in: Proceedings of the 42nd ACM Southeast Regional Conference, 2004, pp. 88-93.
  • 10
    • 37549043336 scopus 로고    scopus 로고
    • Asad Amir Pirzada, Chris McDonald, Establishing trust in pure ad hoc networks, in: Proceedings of the 27th Conference on Australasian Computer Science, 2004, pp. 47-54.
  • 11
    • 3142569233 scopus 로고    scopus 로고
    • Highly reliable trust establishment scheme in ad hoc networks
    • Kui R., Li T., Wan Z., Bao F., Deng R.H., and Kim K. Highly reliable trust establishment scheme in ad hoc networks. Computer Networks 45 (2004) 687-699
    • (2004) Computer Networks , vol.45 , pp. 687-699
    • Kui, R.1    Li, T.2    Wan, Z.3    Bao, F.4    Deng, R.H.5    Kim, K.6
  • 12
    • 37549047376 scopus 로고    scopus 로고
    • Szabo Nick, Shamir's secret sharing. , 1997.
  • 13
    • 11244333253 scopus 로고    scopus 로고
    • Theodorakopoulos George, John S. Baras, Trust evaluation in ad hoc networks, in: Proceedings of the ACM workshop on Wireless Security, 2004, pp. 1-10.
  • 14
    • 37549036080 scopus 로고    scopus 로고
    • Wang Yao, Bayesian network-based trust model in peer-to-peer networks, in: Proceedings Workshop on Deception, Fraud and Trust in Agent Societies, 2003.
  • 15
    • 37549023992 scopus 로고    scopus 로고
    • Zheng Yan, Peng Zhang, Trust evaluation based security solution in ad hoc networks, in: Proceedings of the Seventh Nordic Workshop on Secure IT Systems, 2003.
  • 16
    • 5044222209 scopus 로고    scopus 로고
    • Zhaoyu Liu, A.W. Joy, R.A. Thompson, A dynamic trust model for mobile ad hoc networks, in: Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS 2004, 2004, pp. 80-85.
  • 17
    • 10044251395 scopus 로고    scopus 로고
    • Facilitating secure ad hoc service discovery in public environments
    • Zhu F., Mutka M., and Ni L. Facilitating secure ad hoc service discovery in public environments. Journal of Systems and Software 76 (2005) 45-54
    • (2005) Journal of Systems and Software , vol.76 , pp. 45-54
    • Zhu, F.1    Mutka, M.2    Ni, L.3
  • 18
    • 0035577649 scopus 로고    scopus 로고
    • Trust-based security in pervasive computing environments
    • Lalana K., Tim F., and Anupam J. Trust-based security in pervasive computing environments. IEEE Computer 34 12 (2001) 154-157
    • (2001) IEEE Computer , vol.34 , Issue.12 , pp. 154-157
    • Lalana, K.1    Tim, F.2    Anupam, J.3
  • 19
    • 21644441634 scopus 로고    scopus 로고
    • Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer, An intrusion detection tool for AODV-based ad hoc wireless networks, in: Proceedings of the 20th Annual Computer Security Applications Conference, 2004.
  • 20
    • 37548998782 scopus 로고    scopus 로고
    • J. Wright, Detecting Wireless LAN MAC Address Spoofing, White Paper, January 2003.
  • 22
    • 0042863413 scopus 로고    scopus 로고
    • Proactive seamless mobility management for future IP radio access networks
    • Pagtzis T., Kirstein P.T., Hailes S., and Afifi H. Proactive seamless mobility management for future IP radio access networks. Computer Communications 26 17 (2003) 1975-1989
    • (2003) Computer Communications , vol.26 , Issue.17 , pp. 1975-1989
    • Pagtzis, T.1    Kirstein, P.T.2    Hailes, S.3    Afifi, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.