Reputation based trust management using TCG in Mobile Ad-Hoc networks (RTA)

被引:0
作者
Kpodjedo, Segla [1 ]
Pierre, Samuel [1 ]
Pourzandi, Makan [2 ]
机构
[1] Ecole Polytech, Montreal, PQ H3C 3A7, Canada
[2] Software Res, Montreal, PQ H3C 3A7, Canada
来源
2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2 | 2008年
关键词
Ad-Hoc Networks; Security; Reputation based trust; Trusted Computing; Software Composition;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Mobile Ad-Hoc Networks (MANET) are more and more important due to their increasing use. At the same time, the Trusted Computing Group (TCG) approach in using TPM based hardware root of trust is increasingly used in mobile devices providing a trustable source of knowledge about software composition of devices. In this paper, we develop a new approach to evaluate trust among peers in an Ad Hoc network, based on the reputation of their software composition.
引用
收藏
页码:507 / +
页数:2
相关论文
共 50 条
[21]   Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning [J].
Wei, Zhexiong ;
Tang, Helen ;
Yu, F. Richard ;
Wang, Maoyu ;
Mason, Peter .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (09) :4647-4658
[22]   CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies [J].
Wenjia Li ;
Anupam Joshi ;
Tim Finin .
Distributed and Parallel Databases, 2013, 31 :353-376
[23]   CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies [J].
Li, Wenjia ;
Joshi, Anupam ;
Finin, Tim .
DISTRIBUTED AND PARALLEL DATABASES, 2013, 31 (02) :353-376
[24]   MANIPSEC - IPSEC In Mobile Ad-Hoc Networks [J].
Ali, K. A. Nusrath ;
Basheeruddin, Mohammed ;
Moinuddin, Shaik Khaja ;
Lakkars, Raju .
PROCEEDINGS 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, (ICCSIT 2010), VOL 1, 2010, :635-639
[25]   A Dynamic Monitoring for Energy Consumption Reduction of a Trust-Based Intrusion Detection System in Mobile Ad-hoc Networks [J].
Lupia, Andrea ;
Marano, Salvatore .
PROCEEDINGS OF THE 2016 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2016,
[26]   Secure and anonymous mobile ad-hoc networks [J].
Mu, Y ;
Zhang, FG ;
Susilo, W .
2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, :1132-1136
[27]   Securing ad-hoc networks using IPSec [J].
Ghosh, Abhrajit ;
Talpade, Rajesh ;
Elaoud, Moncef ;
Bereschinsky, Michael .
MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, :2948-2953
[28]   Distributed Management System for Trust and Reward in Mobile Ad hoc Networks [J].
Goka, Sonoko ;
Shigeno, Hiroshi .
2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
[29]   Lightweight Trust Propagation Scheme for Resource Constraint Mobile Ad-hoc NETworks (MANETs) [J].
Kumar, Adarsh ;
Gopal, Krishna ;
Aggarwal, Alok .
2013 SIXTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2013, :421-426
[30]   A Multidimensional Trust Model for Vehicular Ad-Hoc Networks [J].
Najafi, Maryam ;
Khoukhi, Lyes ;
Lemercier, Marc .
PROCEEDINGS OF THE IEEE 46TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2021), 2021, :419-422