{"title":"Application of Dezert-Smarandache theory for tactical MANET security enhancement","authors":"J. Glowacka, Marek Amanowicz","doi":"10.5281/ZENODO.34768","DOIUrl":null,"url":null,"abstract":"The article presents a concept of Dezert-Smarandache theory application for enhancing security in tactical mobile ad-hoc network. Tactical MANET, due to its specification, requires collection and processing of information from different sources of diverse security and trust metrics. The authors specify the needs for building a node's situational awareness and identify data sources used for calculations of trust metrics. They provide some examples of related works and present their own conception of Dezert-Smarandache theory applicability for trust evaluation in mobile hostile environment.","PeriodicalId":431193,"journal":{"name":"2012 Military Communications and Information Systems Conference (MCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Military Communications and Information Systems Conference (MCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5281/ZENODO.34768","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
The article presents a concept of Dezert-Smarandache theory application for enhancing security in tactical mobile ad-hoc network. Tactical MANET, due to its specification, requires collection and processing of information from different sources of diverse security and trust metrics. The authors specify the needs for building a node's situational awareness and identify data sources used for calculations of trust metrics. They provide some examples of related works and present their own conception of Dezert-Smarandache theory applicability for trust evaluation in mobile hostile environment.