Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/12259
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDarwish, S-
dc.contributor.authorTaylor, SJE-
dc.contributor.authorGhinea, G-
dc.date.accessioned2016-03-03T14:49:09Z-
dc.date.available2012-11-05-
dc.date.available2016-03-03T14:49:09Z-
dc.date.issued2012-
dc.identifier.citation11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, pp. 926-930, 25-27 jUN 2012en_US
dc.identifier.isbn9780769547459-
dc.identifier.urihttp://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6296071-
dc.identifier.urihttp://bura.brunel.ac.uk/handle/2438/12259-
dc.description.abstractA Mobile Ad hoc Network (MANET) is receiving a great attention by different communities (e.g. military and civil applications) thanks to its self-configuration and self maintenance potential. Securing a MANET is a very critical matter as it is vulnerable to different attacks and also it is characterised with no clear line of defence. Since any security solution relies on a particular trust model, there are different types of trust models that could suit MANETs. This paper present a design of security architecture based on the hybrid trust model. It consists of a set of servers (i.e. a Central authority Server (CAS), Threshold Authority Servers (TASs) and Delegated Authority Servers (DASs)) emulating certification authorities. Our security architecture caters for improving services availability and utilisation. © 2012 IEEE.en_US
dc.format.extent926 - 930-
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectTrust modelsen_US
dc.subjectPKIen_US
dc.subjectAuthenticationen_US
dc.subjectThresholden_US
dc.subjectCryptographyen_US
dc.subjectSecurity architectureen_US
dc.titleSecurity server-based architecture for mobile ad hoc networksen_US
dc.typeConference Paperen_US
dc.identifier.doihttp://dx.doi.org/10.1109/TrustCom.2012.260-
dc.relation.isPartOfProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012-
pubs.publication-statusPublished-
pubs.publication-statusPublished-
Appears in Collections:Dept of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
Fulltext.pdf478.37 kBAdobe PDFView/Open


Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.