Reputation based trust management using TCG in Mobile Ad-Hoc networks (RTA)

被引:0
作者
Kpodjedo, Segla [1 ]
Pierre, Samuel [1 ]
Pourzandi, Makan [2 ]
机构
[1] Ecole Polytech, Montreal, PQ H3C 3A7, Canada
[2] Software Res, Montreal, PQ H3C 3A7, Canada
来源
2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2 | 2008年
关键词
Ad-Hoc Networks; Security; Reputation based trust; Trusted Computing; Software Composition;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Mobile Ad-Hoc Networks (MANET) are more and more important due to their increasing use. At the same time, the Trusted Computing Group (TCG) approach in using TPM based hardware root of trust is increasingly used in mobile devices providing a trustable source of knowledge about software composition of devices. In this paper, we develop a new approach to evaluate trust among peers in an Ad Hoc network, based on the reputation of their software composition.
引用
收藏
页码:507 / +
页数:2
相关论文
共 50 条
  • [21] Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning
    Wei, Zhexiong
    Tang, Helen
    Yu, F. Richard
    Wang, Maoyu
    Mason, Peter
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (09) : 4647 - 4658
  • [22] CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
    Wenjia Li
    Anupam Joshi
    Tim Finin
    Distributed and Parallel Databases, 2013, 31 : 353 - 376
  • [23] CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
    Li, Wenjia
    Joshi, Anupam
    Finin, Tim
    DISTRIBUTED AND PARALLEL DATABASES, 2013, 31 (02) : 353 - 376
  • [24] MANIPSEC - IPSEC In Mobile Ad-Hoc Networks
    Ali, K. A. Nusrath
    Basheeruddin, Mohammed
    Moinuddin, Shaik Khaja
    Lakkars, Raju
    PROCEEDINGS 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, (ICCSIT 2010), VOL 1, 2010, : 635 - 639
  • [25] A Dynamic Monitoring for Energy Consumption Reduction of a Trust-Based Intrusion Detection System in Mobile Ad-hoc Networks
    Lupia, Andrea
    Marano, Salvatore
    PROCEEDINGS OF THE 2016 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2016,
  • [26] Secure and anonymous mobile ad-hoc networks
    Mu, Y
    Zhang, FG
    Susilo, W
    2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 1132 - 1136
  • [27] Securing ad-hoc networks using IPSec
    Ghosh, Abhrajit
    Talpade, Rajesh
    Elaoud, Moncef
    Bereschinsky, Michael
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 2948 - 2953
  • [28] Distributed Management System for Trust and Reward in Mobile Ad hoc Networks
    Goka, Sonoko
    Shigeno, Hiroshi
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [29] Lightweight Trust Propagation Scheme for Resource Constraint Mobile Ad-hoc NETworks (MANETs)
    Kumar, Adarsh
    Gopal, Krishna
    Aggarwal, Alok
    2013 SIXTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2013, : 421 - 426
  • [30] A Multidimensional Trust Model for Vehicular Ad-Hoc Networks
    Najafi, Maryam
    Khoukhi, Lyes
    Lemercier, Marc
    PROCEEDINGS OF THE IEEE 46TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2021), 2021, : 419 - 422