Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Spreading Activation Models for Trust Propagation
EEE '04 Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04)
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Proceedings of the 10th international conference on Intelligent user interfaces
Computing and applying trust in web-based social networks
Computing and applying trust in web-based social networks
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
Bubblestorm: resilient, probabilistic, and exhaustive peer-to-peer search
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
A model of a trust-based recommendation system on a social network
Autonomous Agents and Multi-Agent Systems
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
Trust-based recommendation systems: an axiomatic approach
Proceedings of the 17th international conference on World Wide Web
Lightweight Distributed Trust Propagation
ICDM '07 Proceedings of the 2007 Seventh IEEE International Conference on Data Mining
Operators for propagating trust and their evaluation in social networks
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
SUNNY: a new algorithm for trust inference in social networks using probabilistic confidence models
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 2
Quality of trust for social trust path selection in complex social networks
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Error analysis of range-based localisation algorithms in wireless sensor networks
International Journal of Sensor Networks
Hi-index | 0.00 |
Development of network of nodes connected with their trust values and the propagation of these trust values to far away nodes are basic operations of the modern day trustworthy networks. Trust can be exploited to mitigate the security threats in wireless network. Most of the existing trust propagation methods are based on flooding trust information, which puts a heavy burden on wireless communication, especially in ad hoc network and sensor network. In this paper, we propose a rendezvous based trust propagation scheme. Trust requester and trust provider send out trust-request and computed-trust tickets respectively, which will meet in some common rendezvous node with certain probability. Computed-trust will then be propagated to the requester. We carry out detailed performance evaluations of our scheme. The results show that our method achieves up to 66% overhead reduction in trust propagation compared to flood based methods.