Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator
ACM Transactions on Modeling and Computer Simulation (TOMACS) - Special issue on uniform random number generation
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Communications of the ACM
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Incentives for Sharing in Peer-to-Peer Networks
WELCOM '01 Proceedings of the Second International Workshop on Electronic Commerce
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Detecting deception in reputation management
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Peer-to-Peer Wireless LAN Consortia: Economic Modeling and Architecture
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Modelling incentives for collaboration in mobile ad hoc networks
Performance Evaluation - Selected papers from the first workshop on modeling and optimization in mobile, ad hoc and wireless networks (WiOpt'2003)
Review on Computational Trust and Reputation Models
Artificial Intelligence Review
Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Balancing Queues by Mean Field Interaction
Queueing Systems: Theory and Applications
Using partial differential equations to model TCP mice and elephants in large IP networks
IEEE/ACM Transactions on Networking (TON)
Pricing Communication Networks: Economics, Technology and Modelling (Wiley Interscience Series in Systems and Optimization)
Eliciting Informative Feedback: The Peer-Prediction Method
Management Science
Automated response using system-call delays
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
Enforcing collaboration in peer-to-peer routing services
iTrust'03 Proceedings of the 1st international conference on Trust management
Self-policing mobile ad hoc networks by reputation systems
IEEE Communications Magazine
REputation based Clustering Algorithm for security management in ad hoc networks with liars
International Journal of Information and Computer Security
Computers in Human Behavior
Routing security scheme based on reputation evaluation in hierarchical ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Reputation-based role assignment for role-based access control in wireless sensor networks
Computer Communications
Journal of Network and Computer Applications
Rescuing wireless sensor networks security from science fiction
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Trust measures for competitive agents
Knowledge-Based Systems
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
Solving soft security problem in MANETs using an evolutionary approach
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
Service selection in stochastic environments: a learning-automaton based solution
Applied Intelligence
Analytical evaluation of P2P reputation systems
International Journal of Communication Networks and Distributed Systems
Understanding the effects of P2P dynamics on trust bootstrapping
Information Sciences: an International Journal
Hi-index | 0.00 |
The application of decentralized reputation systems is a promising approach to ensure cooperation and fairness, as well as to address random failures and malicious attacks in Mobile Ad-Hoc Networks. However, they are potentially vulnerable to liars. With our work, we provide a first step to analyzing robustness of a reputation system based on a deviation test. Using a mean-field approach to our stochastic process model, we show that liars have no impact unless their number exceeds a certain threshold (phase transition). We give precise formulae for the critical values and thus provide guidelines for an optimal choice of parameters.