Modeling trust in e-commerce: an approach based on user requirements
Proceedings of the ninth international conference on Electronic commerce
Bridging disjoint trusted domains into a trustworthy system
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
Cognitive radio network architecture: part II -- trusted network layer structure
Proceedings of the 2nd international conference on Ubiquitous information management and communication
A methodology for trust control mode prediction
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
A robust methodology for prediction of trust and reputation values
Proceedings of the 2008 ACM workshop on Secure web services
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Prevention of flooding attacks in mobile ad hoc networks
Proceedings of the International Conference on Advances in Computing, Communication and Control
An Incremental Adaptive Organization for a Satellite Constellation
Organized Adaption in Multi-Agent Systems
A Methodology towards Usable Trust Management
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
End to end secure communication in ad-hoc assistive medical environments using secure paths
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Modelling autonomic and dynamic trust decision-making mechanism for large-scale open environments
International Journal of Computer Applications in Technology
Trust based traffic monitoring approach for preventing denial of service attacks
Proceedings of the 2nd international conference on Security of information and networks
Proceedings of the 2009 International Conference on Hybrid Information Technology
Flexible and secure service discovery in ubiquitous computing
Journal of Network and Computer Applications
ECGK: An efficient clustering scheme for group key management in MANETs
Computer Communications
Modeling and mining of dynamic trust in complex service-oriented systems
Information Systems
Trust-based data disclosure in sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Hybrid trust and reputation management for sensor networks
Wireless Networks
A formal study of trust-based routing in wireless ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
International Journal of Communication Networks and Distributed Systems
VANET alert endorsement using multi-source filters
Proceedings of the seventh ACM international workshop on VehiculAr InterNETworking
cTrust: trust aggregation in cyclic mobile ad hoc networks
Euro-Par'10 Proceedings of the 16th international Euro-Par conference on Parallel processing: Part II
Secure geographic routing in ad hoc and wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on signal processing-assisted protocols and algorithms for cooperating objects and wireless sensor networks
AdContRep: a privacy enhanced reputation system for MANET content services
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Multi-dimensional evidence-based trust management with multi-trusted paths
Future Generation Computer Systems
Cautious rating for trust-enabled routing in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Iterative Filtering in Reputation Systems
SIAM Journal on Matrix Analysis and Applications
FlowTrust: trust inference with network flows
Frontiers of Computer Science in China
AdChatRep: a reputation system for MANET chatting
Proceedings of 1st international symposium on From digital footprints to social and community intelligence
AdPriRec: a context-aware recommender system for user privacy in MANET services
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
Trust-based minimum cost opportunistic routing for Ad hoc networks
Journal of Systems and Software
Extracting trust information from security system of a service
Journal of Network and Computer Applications
Trustpert: a reputation model for collaboration in MANETs using fuzzy expert systems
Proceedings of the Second Kuwait Conference on e-Services and e-Systems
Context-sensitive trust computing in distributed environments
Knowledge-Based Systems
Collaborative service evaluation with the TwoHop trust framework
Security and Communication Networks
TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications
Personal and Ubiquitous Computing
Identifying and utilizing secure paths in ad hoc assistive medical environments
Security and Communication Networks
Trust modeling for message relay control and local action decision making in VANETs
Security and Communication Networks
A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks
Wireless Personal Communications: An International Journal
A practical reputation system for pervasive social chatting
Journal of Computer and System Sciences
Requirements and design for neutral trust management framework in unstructured networks
The Journal of Supercomputing
Hi-index | 0.07 |
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence created by the previous interactions of entities within a protocol. In this work, we are focusing on the evaluation of trust evidence in ad hoc networks. Because of the dynamic nature of ad hoc networks, trust evidence may be uncertain and incomplete. Also, no preestablished infrastructure can be assumed. The evaluation process is modeled as a path problem on a directed graph, where nodes represent entities, and edges represent trust relations. We give intuitive requirements and discuss design issues for any trust evaluation algorithm. Using the theory of semirings, we show how two nodes can establish an indirect trust relation without previous direct interaction. We show that our semiring framework is flexible enough to express other trust models, most notably PGP's Web of Trust. Our scheme is shown to be robust in the presence of attackers.