دانلود مقاله ISI انگلیسی شماره 70524
ترجمه فارسی عنوان مقاله

مدیریت کلید عمومی مبتنی بر آستانه اعتماد در شبکه های ad hoc موبایل

عنوان انگلیسی
Trust threshold based public key management in mobile ad hoc networks
کد مقاله سال انتشار تعداد صفحات مقاله انگلیسی
70524 2016 18 صفحه PDF
منبع

Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)

Journal : Ad Hoc Networks, Volume 44, 1 July 2016, Pages 58–75

ترجمه کلمات کلیدی
مدیریت کلید عمومی؛ شبکه های ad hoc موبایل - اعتماد؛ کلید خصوصی؛ کلید عمومی؛ صدور گواهی
کلمات کلیدی انگلیسی
Public key management; Mobile ad hoc networks; Trust; Private key; Public key; Certificate authority
پیش نمایش مقاله
پیش نمایش مقاله  مدیریت کلید عمومی مبتنی بر آستانه اعتماد در شبکه های ad hoc موبایل

چکیده انگلیسی

Public key management in mobile ad hoc networks (MANETs) has been studied for several decades. However, the unique characteristics of MANETs have imposed great challenges in designing a fully distributed public key management protocol under resource-constrained MANET environments. These challenges include no centralized trusted entities, resource constraints, and high security vulnerabilities. This work proposes a fully distributed trust-based public key management approach for MANETs using a soft security mechanism based on the concept of trust. Instead of using hard security approaches, as in traditional security techniques, to eliminate security vulnerabilities, our work aims to maximize performance by relaxing security requirements based on the perceived trust. We propose a composite trust-based public key management (CTPKM) with the goal of maximizing performance while mitigating security vulnerability. Each node employs a trust threshold to determine whether or not to trust another node. Our simulation results show that an optimal trust threshold exists to best balance and meet the conflicting goals between performance and security, by exploiting the inherent tradeoff between trust and risk. The results also show that CTPKM minimizes risk (i.e., information leakout) using an optimal trust threshold while maximizing service availability with acceptable communication overhead incurred by trust and key management operations. We demonstrate that CTPKM outperforms both existing non-trust-based and trust-based counterparts.