SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
Why to market IT services and how to do it
SIGUCCS '02 Proceedings of the 30th annual ACM SIGUCCS conference on User services
A secured hierarchical trust management framework for public computing utilities
CASCON '05 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
A price-based reliable routing game in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Agent trust evaluation and team formation in heterogeneous organizations
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
Towards Identifying Features of Trust in Mobile Ad Hoc Network
AMS '08 Proceedings of the 2008 Second Asia International Conference on Modelling & Simulation (AMS)
Managing Reputation over MANETs
IAS '08 Proceedings of the 2008 The Fourth International Conference on Information Assurance and Security
Reputation-based Trust Update in Network Environment
ISECS '08 Proceedings of the 2008 International Symposium on Electronic Commerce and Security
Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
Wireless Routing Protocol Based on Trust Evaluation
ICSNC '08 Proceedings of the 2008 Third International Conference on Systems and Networks Communications
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks
Pricing for enabling forwarding in self-configuring ad hoc networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
While the notion of reputation is proposed to enhance an entity's trustworthiness and improve the security of a network, the problems of trust and reputation themselves, such as fair evaluation, peer assistance, efficient computation, become an important challenge in such systems. This paper addresses the issues of adaptive trust calculation and efficient reputation evaluation in wireless and mobile networks via a distributed approach. We first present the trust relationship between two mutual trustworthy nodes and then an adaptive computational trust prototype is formulated to effectively prevent malicious nodes from entering the trusted community. Through the analysis of our model's security properties, our system is proved to show how it is able to offer security protections to a dynamic but agile environment and at the same time prevent improper behavior within a community.