메뉴 건너뛰기




Volumn 28, Issue 3-4, 2009, Pages 199-214

Reliable and fully distributed trust model for mobile ad hoc networks

Author keywords

MANETs; Security; Threshold cryptography; Trust graph; Trust model

Indexed keywords

MOBILE AD HOC NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; TELECOMMUNICATION LINKS; TELECOMMUNICATION NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 63049099708     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.11.009     Document Type: Article
Times cited : (94)

References (31)
  • 2
    • 0242456134 scopus 로고    scopus 로고
    • Capkun S, Buttyan L, Hubaux J. Small worlds in security systems: an analysis of the PGP certificate graph. In: New security paradigms workshop 2002; 2002.
    • Capkun S, Buttyan L, Hubaux J. Small worlds in security systems: an analysis of the PGP certificate graph. In: New security paradigms workshop 2002; 2002.
  • 3
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Capkun S., Buttyan L., and Hubaux J. Self-organized public-key management for mobile ad hoc networks. IEEE Trans Mobile Comput (March 2003)
    • (2003) IEEE Trans Mobile Comput
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.3
  • 5
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in wireless ad hoc networks
    • Deng H., Li W., and Agrawal D.P. Routing security in wireless ad hoc networks. IEEE Commun Mag (October 2002) 70-75
    • (2002) IEEE Commun Mag , pp. 70-75
    • Deng, H.1    Li, W.2    Agrawal, D.P.3
  • 6
    • 34548050159 scopus 로고    scopus 로고
    • Providing distributed certificate authority service in cluster-based mobile ad hoc networks
    • Dong Y., Sui A.-F., Yiu S., Li V.O., and Hui L.C. Providing distributed certificate authority service in cluster-based mobile ad hoc networks. Elsevier, Comput Commun (May 2007)
    • (2007) Elsevier, Comput Commun
    • Dong, Y.1    Sui, A.-F.2    Yiu, S.3    Li, V.O.4    Hui, L.C.5
  • 7
    • 0001847481 scopus 로고
    • On the evolution of random graphs
    • Erdos P., and Rényi A. On the evolution of random graphs. Acta Math Hung (1960) 17-61
    • (1960) Acta Math Hung , pp. 17-61
    • Erdos, P.1    Rényi, A.2
  • 9
    • 0242410360 scopus 로고    scopus 로고
    • A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    • Hwang M., Lu E., and Lin I.-C. A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans Knowledge Data Eng 15 (November/December 2003) 1552-1560
    • (2003) IEEE Trans Knowledge Data Eng , vol.15 , pp. 1552-1560
    • Hwang, M.1    Lu, E.2    Lin, I.-C.3
  • 10
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Kluwer Academic Publishers
    • Johnson D., and Maltz D. Dynamic source routing in ad hoc wireless networks. Mobile computing vol. 353 (1996), Kluwer Academic Publishers
    • (1996) Mobile computing , vol.353
    • Johnson, D.1    Maltz, D.2
  • 11
    • 63049093816 scopus 로고    scopus 로고
    • Kohl J, Neuman B. The Kerberos network authentication service version 5. RFC-1510; 1991
    • Kohl J, Neuman B. The Kerberos network authentication service version 5. RFC-1510; 1991.
  • 13
    • 0008144151 scopus 로고    scopus 로고
    • Ubiquitous and robust authentication services for ad hoc wireless networks
    • Technical report, UCLA Computer; 2000
    • Luo H, Lu S. Ubiquitous and robust authentication services for ad hoc wireless networks. Technical report, UCLA Computer; 2000.
    • Luo, H.1    Lu, S.2
  • 14
    • 30344446233 scopus 로고    scopus 로고
    • Dictate: distributed certification authority with probabilistic freshness for ad hoc networks
    • Luo J., Hubaux J., and Eugster P. Dictate: distributed certification authority with probabilistic freshness for ad hoc networks. IEEE Trans Dependable Secure Comput (2005)
    • (2005) IEEE Trans Dependable Secure Comput
    • Luo, J.1    Hubaux, J.2    Eugster, P.3
  • 19
    • 0003582910 scopus 로고    scopus 로고
    • Addison Wesley Professional
    • Perkins C. Ad hoc networking (December 2000), Addison Wesley Professional
    • (2000) Ad hoc networking
    • Perkins, C.1
  • 20
    • 0033314753 scopus 로고    scopus 로고
    • An overview of PKI trusts models
    • Perlman R. An overview of PKI trusts models. IEEE Netw (1999)
    • (1999) IEEE Netw
    • Perlman, R.1
  • 25
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Commun ACM (1979)
    • (1979) Commun ACM
    • Shamir, A.1
  • 30
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L., and Haas Z. Securing ad hoc networks. IEEE Netw 6 13 (November-December 1999) 24-30
    • (1999) IEEE Netw , vol.6 , Issue.13 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 31
    • 18244376871 scopus 로고    scopus 로고
    • Efficient and robust key management for large mobile ad hoc networks
    • Zhu B., Bao F., Deng R., Kankanhalli M., and Wang G. Efficient and robust key management for large mobile ad hoc networks. Elsevier, Comput Netw 48 (December 2005) 657-682
    • (2005) Elsevier, Comput Netw , vol.48 , pp. 657-682
    • Zhu, B.1    Bao, F.2    Deng, R.3    Kankanhalli, M.4    Wang, G.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.