Modeling trust in e-commerce: an approach based on user requirements
Proceedings of the ninth international conference on Electronic commerce
Bridging disjoint trusted domains into a trustworthy system
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
Trust4All: a trustworthy middleware platform for component software
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
A methodology for trust control mode prediction
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
A comprehensive trust model for component software
Proceedings of the 4th international workshop on Security, privacy and trust in pervasive and ubiquitous computing
Subjective logic based trust model for mobile ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Prevention of flooding attacks in mobile ad hoc networks
Proceedings of the International Conference on Advances in Computing, Communication and Control
Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
A Methodology towards Usable Trust Management
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Modelling autonomic and dynamic trust decision-making mechanism for large-scale open environments
International Journal of Computer Applications in Technology
Trust based traffic monitoring approach for preventing denial of service attacks
Proceedings of the 2nd international conference on Security of information and networks
A framework for detecting selfish misbehavior in wireless mesh community networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Proceedings of the 2009 International Conference on Hybrid Information Technology
Case study: trust establishment in personal area networks
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
Improving SAODV protocol with trust levels management, IDM and incentive cooperation in MANET
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
Design of messenger oriented P2P framework in mobile ad-hoc networks
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Design of mobile server framework in MANET
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Entropy-based trust management for data collection in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Secure route selection based on trust territories for ad hoc networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Distributed cooperative transmission with unreliable and untrustworthy relay channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Cost-sensitive intrusion responses for mobile ad hoc networks
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Integrating neuromuscular and cyber systems for neural control of artificial legs
Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems
Trust-based data disclosure in sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Hybrid trust and reputation management for sensor networks
Wireless Networks
A formal study of trust-based routing in wireless ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
International Journal of Communication Networks and Distributed Systems
cTrust: trust aggregation in cyclic mobile ad hoc networks
Euro-Par'10 Proceedings of the 16th international Euro-Par conference on Parallel processing: Part II
A game theoretic trust model for on-line distributed evolution of cooperation inMANETs
Journal of Network and Computer Applications
AdContRep: a privacy enhanced reputation system for MANET content services
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Multi-dimensional evidence-based trust management with multi-trusted paths
Future Generation Computer Systems
FlowTrust: trust inference with network flows
Frontiers of Computer Science in China
AdChatRep: a reputation system for MANET chatting
Proceedings of 1st international symposium on From digital footprints to social and community intelligence
AdPriRec: a context-aware recommender system for user privacy in MANET services
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
Trust-based minimum cost opportunistic routing for Ad hoc networks
Journal of Systems and Software
A distributed reputation and trust management scheme for mobile peer-to-peer networks
Computer Communications
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications
Personal and Ubiquitous Computing
Source based trusted AODV routing protocol for mobile ad hoc networks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
An adaptive trust control model for a trustworthy component software platform
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Towards trustworthy resource selection: a fuzzy reputation aggregation approach
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Trust modeling for message relay control and local action decision making in VANETs
Security and Communication Networks
A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks
Wireless Personal Communications: An International Journal
A practical reputation system for pervasive social chatting
Journal of Computer and System Sciences
Impact of trust model on on-demand multi-path routing in mobile ad hoc networks
Computer Communications
CyberSAVe: situational awareness visualization for cyber security of smart grid systems
Proceedings of the Tenth Workshop on Visualization for Cyber Security
Comparative trust management with applications: Bayesian approaches emphasis
Future Generation Computer Systems
Hi-index | 0.07 |
The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized authorities. In this paper, we present an information theoretic framework to quantitatively measure trust and model trust propagation in ad hoc networks. In the proposed framework, trust is a measure of uncertainty with its value represented by entropy. We develop four Axioms that address the basic understanding of trust and the rules for trust propagation. Based on these axioms, we present two trust models: entropy-based model and probability-based model, which satisfy all the axioms. Techniques of trust establishment and trust update are presented to obtain trust values from observation. The proposed trust evaluation method and trust models are employed in ad hoc networks for secure ad hoc routing and malicious node detection. A distributed scheme is designed to acquire, maintain, and update trust records associated with the behaviors of nodes' forwarding packets and the behaviors of making recommendations about other nodes. Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.