The official PGP user's guide
Multicluster, mobile, multimedia radio network
Wireless Networks
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Mobile agent security with the IPEditor development tool and the mobile UNITY language
Proceedings of the fifth international conference on Autonomous agents
Towards Fault-Tolerant and Secure Agentry
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
Proceedings of the International Workshop on Security Protocols
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation system for peer-to-peer networks
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
Mobile Agent Security and Telescript
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
Landmark routing in ad hoc networks with mobile backbones
Journal of Parallel and Distributed Computing - Special issue on Routing in mobile and wireless ad hoc networks
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
Tradeoffs in implementing primary-backup protocols
SPDP '95 Proceedings of the 7th IEEE Symposium on Parallel and Distributeed Processing
A Fault-Tolerant Protocol for Providing the Exactly-Once Property of Mobile Agents
SRDS '98 Proceedings of the The 17th IEEE Symposium on Reliable Distributed Systems
Modeling Fault-Tolerant Mobile Agent Execution as a Sequence of Agreement Problems
SRDS '00 Proceedings of the 19th IEEE Symposium on Reliable Distributed Systems
Distributed Clustering for Ad Hoc Networks
ISPAN '99 Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms and Networks
Towards Trust-Aware Resource Management in Grid Computing Systems
CCGRID '02 Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Trust and Reputation Model in Peer-to-Peer Networks
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
A Dynamic Trust Model for Mobile Ad Hoc Networks
FTDCS '04 Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Effective use of reputation in peer-to-peer environments
CCGRID '04 Proceedings of the 2004 IEEE International Symposium on Cluster Computing and the Grid
Spatial security policies for mobile agents in a sentient computing environment
FASE'03 Proceedings of the 6th international conference on Fundamental approaches to software engineering
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
The capacity of wireless networks
IEEE Transactions on Information Theory
Adaptive clustering for mobile wireless networks
IEEE Journal on Selected Areas in Communications
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors
WWIC 2009 Proceedings of the 7th International Conference on Wired/Wireless Internet Communications
A trust establishment scheme for cluster-based sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
Computer Standards & Interfaces
Trust management systems for wireless sensor networks: Best practices
Computer Communications
Integrated Computer-Aided Engineering
TRMSim-WSN, trust and reputation models simulator for wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Hybrid trust and reputation management for sensor networks
Wireless Networks
TRIMS, a privacy-aware trust and reputation model for identity management systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Reputation-based role assignment for role-based access control in wireless sensor networks
Computer Communications
Improving security in WMNs with reputation systems and self-organizing maps
Journal of Network and Computer Applications
Cautious rating for trust-enabled routing in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
A Trust Model Based on Service Classification in Mobile Services
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Improving reputation systems for wireless sensor networks using genetic algorithms
Proceedings of the 13th annual conference on Genetic and evolutionary computation
Detecting bad-mouthing attacks on reputation systems using self-organizing maps
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Reputation modeling for wireless sensor networks
WASA'11 Proceedings of the 6th international conference on Wireless algorithms, systems, and applications
A variable weight based fuzzy data fusion algorithm for WSN
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
Mobility in collaborative alert systems: building trust through reputation
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks
Journal of Network and Computer Applications
Study of WSNs trust valuation based on node behavior
ICICA'11 Proceedings of the Second international conference on Information Computing and Applications
Modeling access control for cyber-physical systems using reputation
Computers and Electrical Engineering
An integrated scheme based on service classification in pervasive mobile services
International Journal of Communication Systems
LFTM, linguistic fuzzy trust mechanism for distributed networks
Concurrency and Computation: Practice & Experience
Information Sciences: an International Journal
Journal of Network and Systems Management
WSANRep, WSAN Reputation-Based Selection in Open Environments
Wireless Personal Communications: An International Journal
Management and applications of trust in Wireless Sensor Networks: A survey
Journal of Computer and System Sciences
Trust models and applications in communication and multi-agent systems
International Journal of Knowledge-based and Intelligent Engineering Systems - Selected papers of KES2012-Part 2 of 2
Hi-index | 0.24 |
Wireless sensors networks are susceptible to a large number of security threats, and because of the communication, computation and delay constraints of most applications that run on top of these networks, traditional security mechanisms cannot be used. Trust and reputation have been recently suggested as an effective security mechanism for open environments such as the Internet, and considerable research has been done on modeling and managing trust and reputation. Using the trust and reputation management scheme to secure wireless sensor networks (WSNs) requires paying close attention to the incurred bandwidth and delay overhead, which have thus far been overlooked by most research work. In this paper, we propose a novel agent-based trust and reputation management scheme (ATRM) for wireless sensor networks. The objective of the scheme is to manage trust and reputation locally with minimal overhead in terms of extra messages and time delay. Throughout the entirety of this paper, we describe our scheme and prove its correctness. We will also present our extensive performance evaluation results, which clearly show that trust and reputation can be computed in wireless sensor networks with minimal overhead.