The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
A Security Association (SA), established by strong authentication, between a node pair in a Mobile Ad hoc Network (MANET) could be lost when its route is disconnected. In contrast, in good channel conditions and stable topology, routing protocols such as the Optimized Link State Routing (OLSR) do not refresh routes periodically, and in doing so, an SA bound to these routes could become stale and out...
One way to minimize threats in P2P system is to exploit reputation to help evaluate the trustworthiness and predict the future behaviors of peers. Most existing methods for trust management, which are based on reputation, focus on preventing network from the malicious peers. In fact, peers' capabilities to fulfill the tasks are also important factors, which will greatly impact the efficiency of P2P...
The peer-to-peer network has been widely used to share large files anonymously. Because of its open nature, nodes can join and leave peer-to-peer networks freely. But there are few limited methods to ensure their trust. Malicious nodes can expose great security threats to peer-to-peer networks such as spreading unauthentic data and viruses. But handling all the malicious nodes in the same way causes...
We find that traditional authentication ways donpsilat act well in MANETs for the features of dynamic topology and non-existence of central facilities in mobile ad hoc networks. This paper presents a distributed trust proving language, which is based on role trust. The solution of constructing credential authentication infrastructure and the problem how to perform automated trust negotiation are also...
This paper focuses on the security of the Athens wireless metropolitan network (AWMN), which is an established autonomous network. More specifically, it presents and analyzes the possible security attacks that threaten AWMN, its users and the provided services. Attempting to counteract these attacks and the related risks, we study and evaluate the application of known security measures in AWMN that...
Product authentication is needed to detect counterfeit products and to prevent them from entering the distribution channels of genuine products. Security is a critical property of product authentication systems. In this paper, we study trust and security in RFID-based product authentication systems. We first present a formal definition for product authentication process and then derive the general...
The following topics are dealt with: security; privacy; trust; pervasive computing; ubiquitous computing; intrusion detection systems; authentication; and protocols.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.