Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/12259
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Darwish, S | - |
dc.contributor.author | Taylor, SJE | - |
dc.contributor.author | Ghinea, G | - |
dc.date.accessioned | 2016-03-03T14:49:09Z | - |
dc.date.available | 2012-11-05 | - |
dc.date.available | 2016-03-03T14:49:09Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, pp. 926-930, 25-27 jUN 2012 | en_US |
dc.identifier.isbn | 9780769547459 | - |
dc.identifier.uri | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6296071 | - |
dc.identifier.uri | http://bura.brunel.ac.uk/handle/2438/12259 | - |
dc.description.abstract | A Mobile Ad hoc Network (MANET) is receiving a great attention by different communities (e.g. military and civil applications) thanks to its self-configuration and self maintenance potential. Securing a MANET is a very critical matter as it is vulnerable to different attacks and also it is characterised with no clear line of defence. Since any security solution relies on a particular trust model, there are different types of trust models that could suit MANETs. This paper present a design of security architecture based on the hybrid trust model. It consists of a set of servers (i.e. a Central authority Server (CAS), Threshold Authority Servers (TASs) and Delegated Authority Servers (DASs)) emulating certification authorities. Our security architecture caters for improving services availability and utilisation. © 2012 IEEE. | en_US |
dc.format.extent | 926 - 930 | - |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Trust models | en_US |
dc.subject | PKI | en_US |
dc.subject | Authentication | en_US |
dc.subject | Threshold | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Security architecture | en_US |
dc.title | Security server-based architecture for mobile ad hoc networks | en_US |
dc.type | Conference Paper | en_US |
dc.identifier.doi | http://dx.doi.org/10.1109/TrustCom.2012.260 | - |
dc.relation.isPartOf | Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 | - |
pubs.publication-status | Published | - |
pubs.publication-status | Published | - |
Appears in Collections: | Dept of Computer Science Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Fulltext.pdf | 478.37 kB | Adobe PDF | View/Open |
Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.