Communications of the ACM
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Semantic constraints for trust transitivity
APCCM '05 Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling - Volume 43
Reputation-based Wi-Fi deployment
ACM SIGMOBILE Mobile Computing and Communications Review
BAR fault tolerance for cooperative services
Proceedings of the twentieth ACM symposium on Operating systems principles
Taxonomy of trust: categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
A method for access authorisation through delegation networks
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
Enforcing collaboration in peer-to-peer routing services
iTrust'03 Proceedings of the 1st international conference on Trust management
Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A Coalitional Game Model for Heat Diffusion Based Incentive Routing and Forwarding Scheme
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Trust-based data disclosure in sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Hybrid trust and reputation management for sensor networks
Wireless Networks
A novel reputation computation model based on subjective logic for mobile ad hoc networks
Future Generation Computer Systems
Cautious rating for trust-enabled routing in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Network trust management in emergency situations
Journal of Computer and System Sciences
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
This paper gives an approach to reputation computation that incorporates "uncertainty" based on subjective logic. Uncertainty can arise when a node joins the network and thus has no history, or when a node's behavior changes in a way that is not clearly malicious, but at least suspicious. This uncertainty indicates when a node evaluating the reputation rating of another node should poll its neighbors for recommendations, because its local opinion is not sufficiently well-informed.The uncertainty based algorithm has several parameters and the computed reputation depends on these parameters. To evaluate the effectiveness of the uncertainty based method and to determine the effect of the parameters on the reputation computations, we have implemented a simulation infrastructure for the behavior of ad-hoc networks using the uncertainty based scheme. The simulator can also use other previously proposed mechanisms for reputation computation. The simulator is used to determine optimal parameters for the various schemes and how well each scheme a) ensures cooperative nodes receive service when requested, and b) throttles the ability of free-loading (malicious) nodes to consume service without contributing. The simulations show that the reputation computation that incorporates uncertainty provides superior recognition of "malicious" behavior in a variety of ad-hoc network situations. These initial results are sufficiently promising to motivate continuing study of reputation computations incorporating uncertainty to additional models of malicious behavior and a broader range of network behaviors.