Learn More
— The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized authorities. In this paper, we present an information theoretic framework to quantitatively measure trust and model trust propagation in ad hoc(More)
— The performance of distributed networks depends on collaboration among distributed entities. To enhance security in distributed networks, such as ad hoc networks, it is important to evaluate the trustworthiness of participating entities since trust is the major driving force for collaboration. In this paper, we present a framework to quantitatively(More)
The paper examines the tradeoffs between using a full ac model versus the less exact, but much faster, dc power flow model for LMP-based market calculations. The paper first provides a general discussion of the approximations associated with using a dc model, with an emphasis on the impact these approximations will have on security constrained OPF (SCOPF)(More)
Many group communications require a security infrastructure that ensures multiple levels-of access privilege fix group memhers. Access control in hierarchy is prevalent in multimedia applications, which consist of users that snhscrihe to different quality levels or diffeerent sets of data streams. In .this paper, we present a multi-group key management(More)
Secure multicast applications require key management that provides access control. In wireless networks, where the error rate is high and the bandwidth is limited, the design of key management schemes should place emphasis on reducing the communication burden associated with key updating. A communication-efficient class of key management schemes is those(More)
Reputation systems are playing critical roles in securing today's distributed computing and communication systems. Similar to other security mechanisms, reputation systems can be under attack. In this paper, we report the discovery of a new attack, named RepTrap(Reputation Trap), against feedback-based reputation systems, such as those used in P2P(More)
— In this paper, we propose a time-efficient contributory key agreement framework for secure communications in dynamic groups. The proposed scheme employs a special join-tree/exit-tree topology in the logical key tree and effectively exploits the efficiency of amortized operations. We derive the optimal parameters and design an activation algorithm for the(More)
OFDM modulation, which has been adopted by the Digital Video Broadcasting (DVB-T) standard in Europe, has been recognized for its good performance for high data rate wireless communications. Therefore, the study of the robust transmission of multime-dia data over the OFDM systems has attracted extensive research interest. In the past, channel estimation,(More)
—Collaborative sensing in cognitive radio networks can significantly improve the probability of detecting the transmission of primary users. In current collaborative sensing schemes, all collaborative secondary users are assumed to be honest. As a consequence, the system is vulnerable to attacks in which malicious secondary users report false detection(More)
—Collaborative spectrum sensing in cognitive radio networks has been proposed as an efficient way to improve the performance of primary users detection. In collaborative spectrum sensing schemes, secondary users are often assumed to be trustworthy. In practice, however, cognitive radio nodes can be compromised. Compromised secondary users can report false(More)