Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Proceedings of the 2nd ACM conference on Electronic commerce
Detecting deception in reputation management
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Information Theory, Inference & Learning Algorithms
Information Theory, Inference & Learning Algorithms
Trustworthy Pervasive Computing: The Hard Security Problems
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Agent-based Automated Trust Negotiation for Pervasive Computing
ICESS '05 Proceedings of the Second International Conference on Embedded Software and Systems
A Trust Framework for Pervasive Computing Environments
AICCSA '06 Proceedings of the IEEE International Conference on Computer Systems and Applications
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
Computer Communications
Probabilistic Trust Management in Pervasive Computing
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02
Trustworthiness and Quality of Context Information
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
Trust Modeling and Management in Digital Environments: From Social Concept to System Development
Trust Modeling and Management in Digital Environments: From Social Concept to System Development
Deterministic trust management in pervasive computing
Journal of Mobile Multimedia
A dynamic trust model based on naive bayes classifier for ubiquitous environments
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
B-Trust: bayesian trust framework for pervasive computing
iTrust'06 Proceedings of the 4th international conference on Trust Management
A trust analysis methodology for pervasive computing systems
Trusting Agents for Trusting Electronic Societies
Outlier detection using naïve bayes in wireless ad hoc networks
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications
An integrated approach for trust management based on policy, community adherence and reputation
International Journal of Ad Hoc and Ubiquitous Computing
Trust models and applications in communication and multi-agent systems
International Journal of Knowledge-based and Intelligent Engineering Systems - Selected papers of KES2012-Part 2 of 2
An Effective Model for Indirect Trust Computation in Pervasive Computing Environment
Wireless Personal Communications: An International Journal
Hi-index | 0.24 |
Designing a trust management scheme that can effectively evaluate the relationships among devices in pervasive computing environments is a challenging task. This paper continues the investigation of our recently proposed probabilistic trust management scheme for pervasive computing environments. We argue that in addition to allowing a device to find other appropriate devices with which to interact, while detecting those that are malicious, our trust management scheme is also capable of (1) allowing a device to judge the trustworthiness of another device it interacts with, while making a better use of the received recommendations and (2) behaving as expected when a device has little or enough experience of interactions with other devices and changes dynamically occur in the proportion of malicious devices. Simulation experiments are provided to assess the achievement of the stated goals, using some representative performance metrics.