Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abdul-Rahman A, Hailes S (1997) A Distributed Trust Model. ACM New Security Paradigm Workshop, 1997.
Aberer K, Despotovic Z (2001) Managing Trust in a Peer-2-Peer Information Systems. In: Proceedings of Conference on Information and Knowledge Management (CIKM). Atlanta, Georgia, USA.
Beth T, Borcherding M, Klein B (1994) Valuation of Trust in Open Networks In: Proceedings of the European Symposium on Research in Computer Security (ESORICS). Brighton, UK, pp 3–18.
Blaze M, Feigenbaum J, Lacy J (1996) Decentralized Trust Management. In: Proceedings of the IEEE Conference on Security and Privacy. Oakland, CA, USA.
Buchegger S, Boudec JL (2002) Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad-hoc Networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed, Network-based Processing. Canary Islands, Spain, pp 403–410.
Buchegger S, Boudec JL (2002) Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Networks). MOBIHOC, Switzerland.
Buttyán L, Hubaux JP (2003) Stimulating Cooperation in Self-Organizing Mobile Ad-hoc Networks. Mobile Network and Applications (MONET), vol 8(5), pp 579–592.
Davis CR (2004) A Localized Trust Management Scheme for Ad-hoc Networks. In: Proceedings of the 3rd International Conference on Networking (ICN ’04).
Eschenauer L, Gligor VD, Baras J (2002) On Trust Establishment in Mobile Ad-hoc Networks. In: Proceedings of the Security Protocols Workshop. Cambridge, U.K.
Ghosh T, Pissinou N, Makki K (2005) Towards Designing a Trusted Routing Solution in Mobile Ad-hoc Networks. Mobile Networks and Applications (MONET), vol 10(6), pp 985–995.
Ghosh T, Pissinou N, Makki N (2004) Collaborative Trust-based Secure Routing Against Colluding Malicious Nodes in Multi-hop Ad-hoc Networks. In: Proceedings of 29th IEEE Annual Conference on Local Computer Networks (LCN). Tampa, Florida, USA.
Gray E, et al. (2002) Trust Propagation in Small Worlds. In: Proceedings of the 1st International Conference on Trust Management. Heraklion, Crete, Greece.
He Q, Wu D, Khosla P (2004) SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks. In: Proceedings of the IEEE Wireless Communications and Networking Conference. Atlanta, Georgia, USA.
Jiang T, Baras JS (2004) Ant-based Adaptive Trust Evidence Distribution in MANET. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops. Tokyo, Japan.
Johnson DB, Maltz DA (1999) The Dynamic Source Routing Protocol for Mobile Ad-hoc Networks”, Internet Draft, MANET Working Group, IETF.
Josang A (2001) A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, vol 9(3), pp 279.-311.
Josang A (1998) A Subjective Metric of Authentication. In: Proceedings of ESORICS: European Symposium on Research in Computer Security.
Josang A (1997) Prospectives for Modelling Trust in Information Security. In: Proceedings of Australasian Conference on Information Security and Privacy. Springer, pp 2–13.
Kagal L, Finin T, Joshi A (2001) Moving from Security to Distributed Trust in Ubiquitous Computing Environments. IEEE Computer, vol 34(12).
Lamsal P (2002) Requirements for Modeling Trust in Ubiquitous Computing and Ad-hoc Networks. Ad-hoc Mobile Wireless Networks- Research Seminar on Telecommunications Software.
Li X, Lyu MR, Liu J (2004) A Trust Model Based Routing Protocol for Secure Ad-hoc Networks. In: Proceedings 2004 IEEE Aerospace Conference. Big Sky, Montana, U.S.A.
Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating Routing Misbehavior in Mobile Ad-hoc Networks. In: Proceedings of the 6th annual international conference on Mobile Computing and Networking (MobiCom). Boston, Massachusetts, United States.
Michiardi P, Molva R (2002) CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad-hoc Networks. In: Proceedings of the 6th IFIP Communications and Multimedia Security Conference. Portorosz, Slovenia.
Ngai ECH, Lyu MR (2004) Trust and Clustering-Based Authentication Services in Mobile Ad-hoc Networks. In: Proceedings of the 2nd International Workshop on Mobile Distributed Computing (MDC’04). Tokyo, Japan.
Perkins C, Royer E (1999) Ad-hoc On-Demand Distance Vector Routing. In: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications.
Pirzada AA, McDonald C (2004) Establishing Trust in Pure Ad-hoc Networks. In: 27th Australian Computer Science Conference. Univ. of Otago, Dunedin, New Zealand.
Pissinou N, Ghosh T, Makki K (2004) Collaborative Trust Based Secure Routing in Multihop Ad-hoc Networks. In: Proceedings of The Third IFIP-TC6 Networking Conference (Networking ’04): Springer Verlag, Series:Lecture Notes in Computer Science, vol 3042, pp1446–1451, Athens, Greece.
Theodorakopoulos G, Baras JS (2004) Trust Evaluation in Ad-Hoc Networks. ACM Workshop on Wireless Security (WiSE), Philadelphia, PA, USA.
Verma RRS, O’Mahony D, Tewari H (2001) NTM – Progressive Trust Negotiation in Ad-hoc Networks. In: Proceedings of the 1st joint IEI/IEE Symposium on Telecommunications Systems Research. Dublin, Ireland.
Yan Z, Zhang P, Virtanen T (2003) Trust Evaluation Based Security Solution in Ad-hoc Networks. In: Proceedings of the Seventh Nordic Workshop on Secure IT Systems.
Zeng X, Bagrodia R, Gerla M (1998) Glomosim: A Library for Parallel Simulation of Large-scale Wireless Networks. In: Proceedings of the 12th Workshop on Parallel and Distributed Simulations (PADS). Alberta, Canada.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Ghosh, T., Pissinou, N., Makki, K., Farhat, A. (2007). A Framework for Computing Trust in Mobile Ad-Hoc Networks. In: Makki, S.K., Reiher, P., Makki, K., Pissinou, N., Makki, S. (eds) Mobile and Wireless Network Security and Privacy. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71058-7_4
Download citation
DOI: https://doi.org/10.1007/978-0-387-71058-7_4
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-71057-0
Online ISBN: 978-0-387-71058-7
eBook Packages: EngineeringEngineering (R0)