Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications 2006
DOI: 10.1109/infocom.2006.154
|View full text |Cite
|
Sign up to set email alerts
|

A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks

Abstract: Abstract-The performance of distributed networks depends on collaboration among distributed entities. To enhance security in distributed networks, such as ad hoc networks, it is important to evaluate the trustworthiness of participating entities since trust is the major driving force for collaboration. In this paper, we present a framework to quantitatively measure trust, model trust propagation, and defend trust evaluation systems against malicious attacks. In particular, we address the fundamental understand… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
204
0
2

Year Published

2009
2009
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 284 publications
(208 citation statements)
references
References 28 publications
2
204
0
2
Order By: Relevance
“…Different reputation models are proposed in distributed systems [20][21][22][23]. These reputation models allow peers to ask advice about other peers' trustworthiness when evaluating the trustworthiness of these other peers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Different reputation models are proposed in distributed systems [20][21][22][23]. These reputation models allow peers to ask advice about other peers' trustworthiness when evaluating the trustworthiness of these other peers.…”
Section: Related Workmentioning
confidence: 99%
“…Jiang and Baras [21] uses a global reputation management to evaluate distributed trust by aggregating votes from all peers in the network. Sun et al [22] propose for communication in distributed networks an entropy-based model and a probability-based model, which are used to calculate indirect trust, propagation trust and multi-path trust. These models involve a lot of overhead.…”
Section: Related Workmentioning
confidence: 99%
“…Trust-based systems [21], [22] are interesting approaches to deal with selective forwarding attacks. In these systems, interactions between sensors are used for trust level computation.…”
Section: B the Impact Of Collusion On Resist Protocolsmentioning
confidence: 99%
“…In fact since the overall performance of an autonomic network depends on the collaborations that take place among self-managing entities, it is fundamental to develop suitable models for establishing and maintaining trust relationships between them. As proposed in Sun et al (2006), in this context we will broadly interpret trust as a belief relationship, where an entity is confident that another one will operate fairly, or as it is designed.…”
Section: Introductionmentioning
confidence: 99%
“…As it is pointed out in Sun et al (2006) and in Langheinrich (2003), most of the work on trust management in the literature is essentially based on heuristics and on simulation as evaluation method. The validation of the proposed systems is often an overlooked aspect, where not all solutions are actually verified and almost none are implemented and tested in a real environment.…”
Section: Introductionmentioning
confidence: 99%