Reputation based trust management using TCG in Mobile Ad-Hoc networks (RTA)

被引:0
作者
Kpodjedo, Segla [1 ]
Pierre, Samuel [1 ]
Pourzandi, Makan [2 ]
机构
[1] Ecole Polytech, Montreal, PQ H3C 3A7, Canada
[2] Software Res, Montreal, PQ H3C 3A7, Canada
来源
2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2 | 2008年
关键词
Ad-Hoc Networks; Security; Reputation based trust; Trusted Computing; Software Composition;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Mobile Ad-Hoc Networks (MANET) are more and more important due to their increasing use. At the same time, the Trusted Computing Group (TCG) approach in using TPM based hardware root of trust is increasingly used in mobile devices providing a trustable source of knowledge about software composition of devices. In this paper, we develop a new approach to evaluate trust among peers in an Ad Hoc network, based on the reputation of their software composition.
引用
收藏
页码:507 / +
页数:2
相关论文
共 50 条
[31]   Propagating trust in ad-hoc networks for reliable routing [J].
Pirzada, AA ;
Datta, A ;
McDonald, C .
2004 INTERNATIONAL WORKSHOP ON WIRELESS AD-HOC NETWORKS, 2005, :58-62
[32]   Mitigating Selfishness in Mobile Ad-Hoc Networks Using Virtual Mobility [J].
Sukumaran, Sangheethaa ;
Korath, Arun ;
Ramachandran, Lakshmi .
2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, :49-54
[33]   Trust enhanced secure mobile ad-hoc network routing [J].
Balakrishnan, Venkat ;
Varadharajan, Vijay ;
Lucs, Phillip ;
Tupakula, Udaya Kiran .
21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, :27-+
[34]   Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks [J].
Park, Seong-Soo ;
Lee, Jong-Hyouk ;
Chung, Tai-Myoung .
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, 2009, 5593 :345-+
[35]   Efficient content delivery in mobile ad-hoc networks using CCN [J].
Kim, Dohyung ;
Kim, Jong-hwan ;
Moon, Cheoleun ;
Choi, Jeonghwan ;
Yeom, Ikjun .
AD HOC NETWORKS, 2016, 36 :81-99
[36]   A learning automata based power management for ad-hoc networks [J].
El-Osery, AI ;
Baird, D ;
Abd-Almageed, W .
INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, :3569-3573
[37]   Encounter-based message propagation in mobile ad-hoc networks [J].
Cooper, D. E. ;
Ezhilchelvan, P. ;
Mitrani, I. .
AD HOC NETWORKS, 2009, 7 (07) :1271-1284
[38]   SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks [J].
He, Q ;
Wu, DP ;
Khosla, P .
2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, :825-830
[39]   Revocation Management in Vehicular Ad-hoc Networks [J].
Martin-Fernandez, Francisco ;
Caballero-Gil, Pino ;
Caballero-Gil, Candido .
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, :1210-1217
[40]   A partition detection system for mobile ad-hoc networks [J].
Ritter, H ;
Winter, R ;
Schiller, J .
2004 FIRST ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2004, :489-497