Abstract | ||
---|---|---|
We present some properties of trust establishment in mobile, ad-hoc networks and illustrate how they differ from those of trust establishment in the Internet. We motivate these differences by providing an example of ad-hoc network use in battlefield scenarios, yet equally practical examples can be found in non-military environments. We argue that peer-to-peer networks are especially suitable to solve the problems of generation, distribution, and discovery of trust evidence in mobile ad-hoc networks, and illustrate the importance of evaluation metrics in trust establishment. |
Year | DOI | Venue |
---|---|---|
2002 | 10.1007/978-3-540-39871-4_6 | Lecture Notes in Computer Science |
Keywords | Field | DocType |
ad hoc network,networks,security,simulation,mobile,detectors,nodes,mobile ad hoc network,routing | Mobile ad hoc network,Battlefield,Telecommunications network,Cellular radio,Computer science,Computer security,Swarm intelligence,Computer network,Wireless ad hoc network,The Internet | Conference |
Volume | ISSN | Citations |
2845 | 0302-9743 | 99 |
PageRank | References | Authors |
6.36 | 25 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Laurent Eschenauer | 1 | 1736 | 98.99 |
Virgil D. Gligor | 2 | 4133 | 513.94 |
John S. Baras | 3 | 1953 | 257.50 |
VD Gligor | 4 | 119 | 7.39 |