The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Specific properties of MANETs results in basic differences between wired networks and wireless networks in security solutions. In recent years, trust models have established themselves as a main approach for security and performance improvement of sections of MANETs. Recent researches have used trust models for problems like routing, admission control and information sharing in MANETs. In spite of...
Maintaining security associations (SA) in mobile ad hoc networks (MANET) is challenging due to their intrinsically open, dynamic, and decentralized nature. Bandwidth limitations arising from both the physical characteristics of the wireless medium and the control overhead required to maintain routes in a network with changing topology add another level of difficulty to the problem. While establishing...
Vehicles will exchange much information in the future in order to efficiently maintain their inner model of the environment. Before they can belief received pieces of information, they must evaluate their reliability. Trust is a mechanism to estimate this reliability based on the sender. As cars often drive the same route, they meet each other again and again. They can establish friendship-like relations...
In order to improve the trustworthiness of network and decrease the cheating behavior among the nodes in the network, a model for trust discovery based on weighted closeness (WCTD) is presented. This model considers the factors such as the transition fading, time decay, and weights of the path and so on when performing the trust path searching and choosing. So trustor can find the node which satisfies...
Collaborative business processes often consist of services provided by multiple business entities which agree to join a business collaboration. To enable trustworthy and secure consumption and provisioning of services across organizational boundaries, security requirements must be carefully defined so as to be coherent, consistent, and in compliance with designed business processes. However, managing...
In order to resolve the security problems due to the dynamics and uncertainty of Peer-to-Peer network environment, this paper proposes a new trust model which is based on group- recommend (GRBTrust). Experimental results demonstrate that this model can deal with the malicious attacks and help the users to choose trading partner which can be trusted.
GEMOM (Genetic Message Oriented Secure Middleware) is an EU FP7 ICT project that focuses on the significant and measurable increase in the end-to-end intelligence, security and resilience of complex, distributed information systems. Complex, distributed software systems are virtually impossible to implement without heavy use of messaging infrastructure. While the existing state of the art achieves...
The anonymity and dynamic characters of p2p (peer to peer) system makes p2p become hotbed with selfish and vicious action. In order to solve the problem of node cheating caused by high dynamic property of P2P, this paper designs a security trust model -- BGTR based on the idea of probability model and fuzzy mathematics. The scheme adopts a new query method that the inquiry peer initiates the calculated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.