NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
An evidential model of distributed reputation management
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Trust and Reputation Model in Peer-to-Peer Networks
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Constructing internet coordinate system based on delay measurement
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement
Virtual landmarks for the internet
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Pattern Recognition and Machine Learning (Information Science and Statistics)
Pattern Recognition and Machine Learning (Information Science and Statistics)
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
Fuzzy Dynamic Programming Based Trusted Routing Decision in Mobile Ad Hoc Networks
SEC '08 Proceedings of the 2008 Fifth IEEE International Symposium on Embedded Computing
IITSI '09 Proceedings of the 2009 Second International Symposium on Intelligent Information Technology and Security Informatics
Mitigation of the effects of selfish and malicious nodes in ad-hoc networks
WSEAS Transactions on Computers
A trust model based on fuzzy recommendation for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security in Ad Hoc Networks: From Vulnerability to Risk Management
SECURWARE '09 Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies
Practical connectivity-based routing in wireless sensor networks using dimension reduction
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Bayesian network trust model in peer-to-peer networks
AP2PC'03 Proceedings of the Second international conference on Agents and Peer-to-Peer Computing
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In this paper, we discuss the risk assessment of ad hoc networks, which have highly dynamic topology, open access of wireless channels, and vulnerable data communication. Conventional risk assessment methods are subjective and unreliable as some nodes reveal little information, and the quantity of samples is limited in ad hoc networks. To solve this problem, we propose a GRAP method, which includes grey relational projection (GRP), grey prediction, and grey decision making. Our scheme is designed to assess nodes' risk under limited circumstances such as small number of samples, incomplete information and lack of experience. Compared with principal component analysis, GRAP has demonstrated better performance and more flexible characteristics. To further the practicability of this method, we utilize a dynamic grey prediction, which shows high accuracy for decision making. In our scheme, four major nodes' attributes are selected, and the experiment results suggest that our model is more effective and efficient for risk assessment than principal component analysis in ad hoc networks.