A policy enforcing mechanism for trusted ad hoc networks

G Xu, C Borcea, L Iftode - IEEE Transactions on Dependable …, 2010 - ieeexplore.ieee.org
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the
applications running in these networks must be regulated by proper communication policies …

Mobile ad-hoc networks security

R Akbani, T Korkmaz, GVS Raju - Recent Advances in Computer Science …, 2012 - Springer
In this paper we are focusing on closed MANETs where only authorized nodes are
supposed to access the network. We denote “outsider” nodes as those nodes that are not …

MATF: A multi-attribute trust framework for MANETs

MS Khan, MI Khan, SUR Malik, O Khalid… - EURASIP Journal on …, 2016 - Springer
To enhance the mobile ad hoc networks (MANETs) security, various trust-based security
schemes have been proposed. However, in most of the trust-based security schemes, a …

Security issues in ad hoc networks

D Zhou - The handbook of ad hoc wireless networks, 2003 - dl.acm.org
In this chapter, we discuss issues and survey current solutions in securing ad hoc wireless
networks. The characteristics of ad hoc networks render the trust a host could place on other …

Robust cooperative trust establishment for MANETs

C Zouridaki, BL Mark, M Hejmo… - … on Security of ad hoc and …, 2006 - dl.acm.org
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to
forward its packets along multi-hop routes to the destination node. Due to the lack of …

A distributed trust model for securing mobile ad hoc networks

P Chatterjee, I Sengupta… - 2010 IEEE/IFIP …, 2010 - ieeexplore.ieee.org
In mobile ad hoc networks, the security enforcement and its implementation becoming
increasingly difficult due to quasi-static nature of the mobile nodes (wireless communication …

Deny-by-default distributed security policy enforcement in mobile ad hoc networks

M Alicherry, AD Keromytis, A Stavrou - Security and Privacy in …, 2009 - Springer
Abstract Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military
and civil rapid-deployment networks, including emergency rescue operations and ad hoc …

A security architecture for wireless ad hoc networks

C Candolin, HH Kari - MILCOM 2002. Proceedings, 2002 - ieeexplore.ieee.org
An ad hoc network is a collection of nodes that do not need to rely on a predefined
infrastructure to keep the network connected. The current trend in military ad hoc networking …

[PDF][PDF] Securing ad hoc Jini services

P Eronen, C Gehrmann, P Nikander - Proceedings of NordSec2000 …, 2000 - academia.edu
In this paper, we look into the concept of trust in ad hoc wireless networks, and the role of
PKIs in creating trust. By allowing some simplifying assumptions, we propose a solution for …

[PDF][PDF] Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches.

P Albers, O Camp, JM Percher, B Jouga… - Wireless Information …, 2002 - academia.edu
In the last few years, the performances of wireless technologies have increased
tremendously thus opening new fields of application in the domain of networking. One of …