Simulated social control for secure Internet commerce
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Certain limitations of reputation--based schemes in mobile environments
MSWiM '05 Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Achieving cooperation in multihop wireless networks of selfish nodes
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
A survey of trust and reputation systems for online service provision
Decision Support Systems
Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
Performance Evaluation
Cooperative packet relaying model for wireless ad hoc networks
Proceedings of the 1st ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing
IPDPS '09 Proceedings of the 2009 IEEE International Symposium on Parallel&Distributed Processing
Probabilistic packet relaying in wireless mobile ad hoc networks
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part I
EUC '10 Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Nature-Inspired Evaluation of Data Classes for Trust Management in MANETs
IPDPSW '11 Proceedings of the 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and PhD Forum
Trust-based route selection in dynamic source routing
iTrust'06 Proceedings of the 4th international conference on Trust Management
Free-riding and whitewashing in peer-to-peer systems
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Local trust systems are used independently by participants of a mobile ad hoc network in order to build direct and indirect reciprocity-based cooperation in packet forwarding. They enable nodes to distinguish between selfish (untrustworthy) and cooperative (trustworthy) users. The type of information used to evaluate the behaviour of other network participants impacts the performance of such systems. Depending on whether the information considers the status of a node's own packets or the packets of others, it can be partitioned into personal and general classes. In this paper we show that the size of the network should have an influence on a node's decision whether to use personal or general data classes by its trust system. To demonstrate this we use an evolutionary approach based on replicator dynamic. The results obtained using the approach and computer simulation allow us to predict how data classes might be used for trust evaluation by independent network users acting out of self-interest. Our simulation studies demonstrate that, in the presence of a small number of nodes, a node should evaluate the level of cooperation of other network participants using personal and general data. However, if the network size is large, then relying on personal data only is the best choice for the node.