A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
2012
Journal of Network and Computer Applications
We define a trust metric for mission-driven group communication systems in mobile ad hoc networks to properly reflect unique characteristics of trust concepts and demonstrate that an optimal trust chain ...
We develop and analyze a trust management protocol for mission-driven group communication systems in mobile ad hoc networks using hierarchical modeling techniques based on stochastic Petri nets. ...
(with G representing bits in a bogus message) P attacker ¼ P send, attacker þ P receive where P send, attacker ¼ P send þ P t G ...
doi:10.1016/j.jnca.2011.03.016
fatcat:3ark7yca4zc5bhz6nxbyyniybi
Trust Establishment in Mobile Ad Hoc Networks: Key Management
[chapter]
2011
Mobile Ad-Hoc Networks: Applications
The first ad hoc networks were primarily deployed in the military domain in the early 1970's by the US Department of Defence, under the projects of DARPA and Packet Radio Network (PRnet) [Haas et al., ...
Ad hoc networks remain an important part of current and future military communication. ...
in Mobile Ad Hoc Networks: Key Management
Mobile Ad-Hoc Networks: Applications www.intechopen.com Trust Establishment in Mobile Ad Hoc Networks: Key Management
Trust Establishment in Mobile ...
doi:10.5772/12866
fatcat:7kgddqyqazf25gndtrwwwwz5n4
Trust Establishment in Mobile Ad Hoc Networks: Direct Trust Distribution-Performance and Simulation
[chapter]
2011
Mobile Ad-Hoc Networks: Protocol Design
Due to the lack of channel capacity in mobile ad hoc networks a 546 Mobile Ad-Hoc Networks: Protocol Design www.intechopen.com Trust Establishment in Mobile Ad Hoc Networks: Direct Trust Distribution-Performance ...
Mobile Ad-Hoc Networks: Protocol Design
540
Trust Establishment in Mobile Ad Hoc Networks: Direct Trust Distribution-Performance and Simulation www.intechopen.com Mobile Ad-Hoc Networks: Protocol ...
doi:10.5772/16226
fatcat:sbqpgsved5ewtaw7l3lsioam4a
Investigation of a bio-inspired security mechanism in Mobile Ad hoc Networks
2013
2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
In this work, we consider the dynamic nature of ad hoc networks in terms of nodes' behavior and nodes' speed with regards to the network size. ...
In Mobile Ad hoc NETworks (MANETs), characteristics such as increased complexity with large scaled network, dynamic topology, absence of infrastructure and centralized control and need for survivability ...
One of the most successful methods in distributed system like mobile ad hoc networks is Ant Colony Optimization (ACO). ...
doi:10.1109/wimob.2013.6673434
dblp:conf/wimob/MemarmoshrefiZH13
fatcat:aydmhah2tzgf5gxils5emiby4y
Quantitative Modeling of Trust and Trust Management Protocols in Next Generation Social Networks Based Wireless Mobile Ad Hoc Networks
2014
Social Science Research Network
Within the context of Network-Centric Operations (NCO), we examine: (i) the capabilities of next generation wireless mobile ad hoc networks; (ii) how trust and trust management are modeled in such mobile ...
ad hoc networks; and, (iii) how trust and trust management are implemented in trust-based task assignment in tactical networks. ...
Metrics for Ad Hoc Network Trust and Trust Management Modeling Based on a research survey of trust management schemes and evaluation of trust for wireless mobile ad hoc networks, Cho et al. ...
doi:10.2139/ssrn.2539180
fatcat:dzdb37dshfcvvofw6k2gatlb4i
Reliable and fully distributed trust model for mobile ad hoc networks
2009
Computers & security
Our work aims to provide a fully distributed trust model for mobile ad hoc networks. ...
A mobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. ...
Conclusion In this paper, we have focused on the trust models and infrastructures in mobile ad hoc networks. ...
doi:10.1016/j.cose.2008.11.009
fatcat:crh2vspm35cr5gorp6ytj5muiu
Adaptive Group Key Management in Mobile Ad-hoc Networks (MANETs)
2013
International Journal of Computer Applications
In fact, any cryptographic means is ineffective if its key management is fragile. Key management is one of the vital aspects for security in mobile ad hoc networks. ...
In mobile ad hoc networks, the processing load and complexity for key management are strongly subject to restriction by the node's available resources like energy and the dynamic nature of network topology ...
Group and peerto-peer communication in mobile cellular based ad hoc networks (MANET) has been of enormous interest in recent years [9] . ...
doi:10.5120/12007-7293
fatcat:vlb7vylzdfdetc6l2hiu4lqite
A brief overview of intelligent mobility management for future wireless mobile networks
2017
EURASIP Journal on Wireless Communications and Networking
Acknowledgements We would like to thank the Editor-in-Chief, Prof. Dr.-Ing. Eduard Jorswieck, for providing us with the opportunity to prepare this special issue. ...
Finally, we also thank all the authors for their interests and for submitting their works for consideration for publication in this special issue. ...
The proposed trust model enhances the security of mobile ad hoc networks by enabling a node to identify and remove malicious nodes from the routing paths by overhearing transmission at multiple nodes. ...
doi:10.1186/s13638-017-0972-6
fatcat:o523esfycfgqpmbo3n7livww64
Trusted and Secured Clustered Protocol in MANET
2016
International Journal of Computer Applications
Mobile Ad hoc Networks (MANETs) are subject to various kinds of attacks. ...
Secured communication with public key authentication service based on trust model and network model to prevent nodes from obtaining false public keys of the others when there are malicious nodes in the ...
Also, the topology of the ad hoc network is dynamically changing and the nodes of the ad hoc network are often mobile. ...
doi:10.5120/ijca2016911999
fatcat:ctfuu3yrajdyfbelnjzge773jq
Integrated social and quality of service trust management of mobile groups in ad hoc networks
2013
2013 9th International Conference on Information, Communications & Signal Processing
of mobile nodes in mobile ad hoc network (MANET) environments. ...
management protocol is close to ground truth status over a wide range of operational and environment conditions with high resiliency to malicious attacks and misbehaving nodes. ...
ACKNOWLEDGMENT This work was supported in part by the Army Research Office under Grant W911NF-12-1-0445. ...
doi:10.1109/icics.2013.6782950
dblp:conf/IEEEicics/ChenGBC13
fatcat:5gx7vhvc5jhnpanywe45iwg7wa
Data Structures and Algorithms for Packet Forwarding and Classification
2009
2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks
adaptive resource management in IPv6 networks p. 1077 Scheduling latency insensitive computer vision tasks p. 1089 Throughput analysis for fully-connected ad hoc network with multiuser detection p. 1101 ...
guarantees in mobile
distributed real-time database systems
p. 358
A new data fusion model of intrusion detection-IDSFP
p. 371
The application of collaborative filtering for trust management in ...
doi:10.1109/i-span.2009.122
dblp:conf/ispan/Sahni09
fatcat:p44oexvkrzbobdwhmrc4lkpglu
Table of content
2009
2009 IEEE International Conference on Pervasive Computing and Communications
of Sensory Data through Asynchronous Sampling A Bandwidth Management Approach for Quality of Service Support in Mobile Ad Hoc Networks Implementation of a MAC Protocol for QoS Support in Wireless Sensor ...
Estimation of AP Queue Length and Frame Retries 128.pdf Localizing Jammers in Wireless Networks 129.pdf A social relation aware routing protocol for mobile ad hoc networks 130.pdf Pervasive Media and ...
doi:10.1109/percom.2009.4912745
fatcat:fhuymlscefcqzge6hrv75diqou
Mobile Anonymous Trust Based Routing Using Ant Colony Optimization
2012
American Journal of Applied Sciences
Approach: In this study, a routing to address anonymous routing with a trust which improves the overall security of the ad hoc network was proposed. ...
Aproach: Problem statement: Ad hoc networks are susceptible to malicious attacks through denial of services, traffic analysis and spoofing. ...
Anonymous routing is a value-added technique used in mobile ad hoc networks for the purposes of security and privacy concerns. ...
doi:10.3844/ajassp.2012.1283.1289
fatcat:wt6hormfnfajrjs6eioaglzzpa
Trusted spanning trees for Delay Tolerant Mobile Ad Hoc Networks
2008
2008 IEEE Conference on Soft Computing in Industrial Applications
Delay Tolerant Networks (DTNs) are an extension of Mobile Ad-Hoc Networks (MANETs). ...
Managing such networks optimally is very difficult, if not impossible. Trust management in such networks receives much attention recently due to their potential application. ...
ACKNOWLEDGEMENT The authors gratefully acknowledge the financial support from Ministére de la Recherche, réf BFR05/037, Grand-Duche de Luxembourg and the Ministry of Science and Technology, Thai Government ...
doi:10.1109/smcia.2008.5045948
fatcat:af65hmpwbzhcdnonzbzv6p3bjm
Wireless networking security: open issues in trust, management, interoperation and measurement
2006
International Journal of Security and Networks (IJSN)
We identify the open security issues associated with trust, management, interoperation and measurement. ...
In this paper, we investigate the recent advances in wireless security from theoretical foundations to evaluation techniques, from network level management to end user trust inference and from individual ...
In Theodorakopoulos and Baras (2004) , the ad hoc network is modelled as a weighted, directed graph: the vertices represent the nodes, and the edges represent the trust relations. ...
doi:10.1504/ijsn.2006.010825
fatcat:glcvloozrbfyzb5hwjom3sjseq
« Previous
Showing results 1 — 15 out of 14,120 results