Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








14,120 Hits in 7.2 sec

Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks

Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen
2012 Journal of Network and Computer Applications  
We define a trust metric for mission-driven group communication systems in mobile ad hoc networks to properly reflect unique characteristics of trust concepts and demonstrate that an optimal trust chain  ...  We develop and analyze a trust management protocol for mission-driven group communication systems in mobile ad hoc networks using hierarchical modeling techniques based on stochastic Petri nets.  ...  (with G representing bits in a bogus message) P attacker ¼ P send, attacker þ P receive where P send, attacker ¼ P send þ P t G  ... 
doi:10.1016/j.jnca.2011.03.016 fatcat:3ark7yca4zc5bhz6nxbyyniybi

Trust Establishment in Mobile Ad Hoc Networks: Key Management [chapter]

Dawoud D.S., Richard L., Ashraph Suliman, Kasmir Raja
2011 Mobile Ad-Hoc Networks: Applications  
The first ad hoc networks were primarily deployed in the military domain in the early 1970's by the US Department of Defence, under the projects of DARPA and Packet Radio Network (PRnet) [Haas et al.,  ...  Ad hoc networks remain an important part of current and future military communication.  ...  in Mobile Ad Hoc Networks: Key Management Mobile Ad-Hoc Networks: Applications www.intechopen.com Trust Establishment in Mobile Ad Hoc Networks: Key Management Trust Establishment in Mobile  ... 
doi:10.5772/12866 fatcat:7kgddqyqazf25gndtrwwwwz5n4

Trust Establishment in Mobile Ad Hoc Networks: Direct Trust Distribution-Performance and Simulation [chapter]

Dawoud D.S., Richard L., Ashraph Suliman, Kasmir Raja
2011 Mobile Ad-Hoc Networks: Protocol Design  
Due to the lack of channel capacity in mobile ad hoc networks a 546 Mobile Ad-Hoc Networks: Protocol Design www.intechopen.com Trust Establishment in Mobile Ad Hoc Networks: Direct Trust Distribution-Performance  ...  Mobile Ad-Hoc Networks: Protocol Design 540 Trust Establishment in Mobile Ad Hoc Networks: Direct Trust Distribution-Performance and Simulation www.intechopen.com Mobile Ad-Hoc Networks: Protocol  ... 
doi:10.5772/16226 fatcat:sbqpgsved5ewtaw7l3lsioam4a

Investigation of a bio-inspired security mechanism in Mobile Ad hoc Networks

Parisa Memarmoshrefi, Hang Zhang, Dieter Hogrefe
2013 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)  
In this work, we consider the dynamic nature of ad hoc networks in terms of nodes' behavior and nodes' speed with regards to the network size.  ...  In Mobile Ad hoc NETworks (MANETs), characteristics such as increased complexity with large scaled network, dynamic topology, absence of infrastructure and centralized control and need for survivability  ...  One of the most successful methods in distributed system like mobile ad hoc networks is Ant Colony Optimization (ACO).  ... 
doi:10.1109/wimob.2013.6673434 dblp:conf/wimob/MemarmoshrefiZH13 fatcat:aydmhah2tzgf5gxils5emiby4y

Quantitative Modeling of Trust and Trust Management Protocols in Next Generation Social Networks Based Wireless Mobile Ad Hoc Networks

Yogesh Malhotra
2014 Social Science Research Network  
Within the context of Network-Centric Operations (NCO), we examine: (i) the capabilities of next generation wireless mobile ad hoc networks; (ii) how trust and trust management are modeled in such mobile  ...  ad hoc networks; and, (iii) how trust and trust management are implemented in trust-based task assignment in tactical networks.  ...  Metrics for Ad Hoc Network Trust and Trust Management Modeling Based on a research survey of trust management schemes and evaluation of trust for wireless mobile ad hoc networks, Cho et al.  ... 
doi:10.2139/ssrn.2539180 fatcat:dzdb37dshfcvvofw6k2gatlb4i

Reliable and fully distributed trust model for mobile ad hoc networks

Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah
2009 Computers & security  
Our work aims to provide a fully distributed trust model for mobile ad hoc networks.  ...  A mobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management.  ...  Conclusion In this paper, we have focused on the trust models and infrastructures in mobile ad hoc networks.  ... 
doi:10.1016/j.cose.2008.11.009 fatcat:crh2vspm35cr5gorp6ytj5muiu

Adaptive Group Key Management in Mobile Ad-hoc Networks (MANETs)

Inderpreet Kaur, A. L N. Rao
2013 International Journal of Computer Applications  
In fact, any cryptographic means is ineffective if its key management is fragile. Key management is one of the vital aspects for security in mobile ad hoc networks.  ...  In mobile ad hoc networks, the processing load and complexity for key management are strongly subject to restriction by the node's available resources like energy and the dynamic nature of network topology  ...  Group and peerto-peer communication in mobile cellular based ad hoc networks (MANET) has been of enormous interest in recent years [9] .  ... 
doi:10.5120/12007-7293 fatcat:vlb7vylzdfdetc6l2hiu4lqite

A brief overview of intelligent mobility management for future wireless mobile networks

Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song
2017 EURASIP Journal on Wireless Communications and Networking  
Acknowledgements We would like to thank the Editor-in-Chief, Prof. Dr.-Ing. Eduard Jorswieck, for providing us with the opportunity to prepare this special issue.  ...  Finally, we also thank all the authors for their interests and for submitting their works for consideration for publication in this special issue.  ...  The proposed trust model enhances the security of mobile ad hoc networks by enabling a node to identify and remove malicious nodes from the routing paths by overhearing transmission at multiple nodes.  ... 
doi:10.1186/s13638-017-0972-6 fatcat:o523esfycfgqpmbo3n7livww64

Trusted and Secured Clustered Protocol in MANET

Syeda Kausar, Syed Abdul, D. Srinivasa
2016 International Journal of Computer Applications  
Mobile Ad hoc Networks (MANETs) are subject to various kinds of attacks.  ...  Secured communication with public key authentication service based on trust model and network model to prevent nodes from obtaining false public keys of the others when there are malicious nodes in the  ...  Also, the topology of the ad hoc network is dynamically changing and the nodes of the ad hoc network are often mobile.  ... 
doi:10.5120/ijca2016911999 fatcat:ctfuu3yrajdyfbelnjzge773jq

Integrated social and quality of service trust management of mobile groups in ad hoc networks

Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho
2013 2013 9th International Conference on Information, Communications & Signal Processing  
of mobile nodes in mobile ad hoc network (MANET) environments.  ...  management protocol is close to ground truth status over a wide range of operational and environment conditions with high resiliency to malicious attacks and misbehaving nodes.  ...  ACKNOWLEDGMENT This work was supported in part by the Army Research Office under Grant W911NF-12-1-0445.  ... 
doi:10.1109/icics.2013.6782950 dblp:conf/IEEEicics/ChenGBC13 fatcat:5gx7vhvc5jhnpanywe45iwg7wa

Data Structures and Algorithms for Packet Forwarding and Classification

Sartaj Sahni
2009 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks  
adaptive resource management in IPv6 networks p. 1077 Scheduling latency insensitive computer vision tasks p. 1089 Throughput analysis for fully-connected ad hoc network with multiuser detection p. 1101  ...  guarantees in mobile distributed real-time database systems p. 358 A new data fusion model of intrusion detection-IDSFP p. 371 The application of collaborative filtering for trust management in  ... 
doi:10.1109/i-span.2009.122 dblp:conf/ispan/Sahni09 fatcat:p44oexvkrzbobdwhmrc4lkpglu

Table of content

2009 2009 IEEE International Conference on Pervasive Computing and Communications  
of Sensory Data through Asynchronous Sampling A Bandwidth Management Approach for Quality of Service Support in Mobile Ad Hoc Networks Implementation of a MAC Protocol for QoS Support in Wireless Sensor  ...  Estimation of AP Queue Length and Frame Retries 128.pdf Localizing Jammers in Wireless Networks 129.pdf A social relation aware routing protocol for mobile ad hoc networks 130.pdf Pervasive Media and  ... 
doi:10.1109/percom.2009.4912745 fatcat:fhuymlscefcqzge6hrv75diqou

Mobile Anonymous Trust Based Routing Using Ant Colony Optimization

J.
2012 American Journal of Applied Sciences  
Approach: In this study, a routing to address anonymous routing with a trust which improves the overall security of the ad hoc network was proposed.  ...  Aproach: Problem statement: Ad hoc networks are susceptible to malicious attacks through denial of services, traffic analysis and spoofing.  ...  Anonymous routing is a value-added technique used in mobile ad hoc networks for the purposes of security and privacy concerns.  ... 
doi:10.3844/ajassp.2012.1283.1289 fatcat:wt6hormfnfajrjs6eioaglzzpa

Trusted spanning trees for Delay Tolerant Mobile Ad Hoc Networks

Apivadee Piyatumrong, Pascal Bouvry, Frederic Guinand, Kittichai Lavangnananda
2008 2008 IEEE Conference on Soft Computing in Industrial Applications  
Delay Tolerant Networks (DTNs) are an extension of Mobile Ad-Hoc Networks (MANETs).  ...  Managing such networks optimally is very difficult, if not impossible. Trust management in such networks receives much attention recently due to their potential application.  ...  ACKNOWLEDGEMENT The authors gratefully acknowledge the financial support from Ministére de la Recherche, réf BFR05/037, Grand-Duche de Luxembourg and the Ministry of Science and Technology, Thai Government  ... 
doi:10.1109/smcia.2008.5045948 fatcat:af65hmpwbzhcdnonzbzv6p3bjm

Wireless networking security: open issues in trust, management, interoperation and measurement

Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
2006 International Journal of Security and Networks (IJSN)  
We identify the open security issues associated with trust, management, interoperation and measurement.  ...  In this paper, we investigate the recent advances in wireless security from theoretical foundations to evaluation techniques, from network level management to end user trust inference and from individual  ...  In Theodorakopoulos and Baras (2004) , the ad hoc network is modelled as a weighted, directed graph: the vertices represent the nodes, and the edges represent the trust relations.  ... 
doi:10.1504/ijsn.2006.010825 fatcat:glcvloozrbfyzb5hwjom3sjseq
« Previous Showing results 1 — 15 out of 14,120 results