A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Information agent technology for the Internet: a survey
Data & Knowledge Engineering - Special issue on heterogeneous information resources need semantic access
Why to market IT services and how to do it
SIGUCCS '02 Proceedings of the 30th annual ACM SIGUCCS conference on User services
Disseminating Trust Information in Wearable Communities
Personal and Ubiquitous Computing
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Group management for mobile Ad Hoc networks: design, implementation and experiment
Proceedings of the 6th international conference on Mobile data management
Certain limitations of reputation--based schemes in mobile environments
MSWiM '05 Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
A secured hierarchical trust management framework for public computing utilities
CASCON '05 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
A reputation-based trust management system for P2P networks
CCGRID '04 Proceedings of the 2004 IEEE International Symposium on Cluster Computing and the Grid
A framework for incentive compatible topology control in non-cooperative wireless multi-hop networks
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Achieving cooperation in multihop wireless networks of selfish nodes
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
A price-based reliable routing game in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Performance Evaluation - Performance modelling and evaluation of wireless ad hoc and sensor networks
A new fuzzy-based cooperative movement model in support of qos in wireless ad-hoc network
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Trusted secure routing for ad hoc networks
Proceedings of the 5th ACM international workshop on Mobility management and wireless access
Agent trust evaluation and team formation in heterogeneous organizations
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
Pricing for enabling forwarding in self-configuring ad hoc networks
IEEE Journal on Selected Areas in Communications
An adaptive computational trust model for mobile ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A novel reputation computation model based on subjective logic for mobile ad hoc networks
Future Generation Computer Systems
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
Hi-index | 0.00 |
Robust trust and reputation evaluation services are significant to ensure the security of mobile ad hoc networks, as centralized administration is not easy to be applied and these networks do not have fixed infrastructures. However, malicious behaviors obviously can make wireless and mobile networks at risk so malicious nodes should be detected and excluded. In this paper, we study the issue of how to evaluate efficiently a node's reputation in a distributed approach. First, a set of management mechanisms is presented to prevent effectively malicious nodes from entering the trusted community. Then we formulate a comprehensive computational reputation model. Through a set of extensive simulation experiments based on the ns-2 simulator, our simulation results demonstrate that our system indeed are more sensitive to suspicious behaviors and peers, and thereby improper behaviors within a community are prevented effectively. Therefore, in dynamic but agile environments, our computational reputation system exhibits high adaptation and low complexity, so that it leads to secure communication among mobile nodes.