2014
DOI: 10.1093/comjnl/bxu075
|View full text |Cite
|
Sign up to set email alerts
|

CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks

Abstract: Multi-hop wireless networks (MWNs) have been widely accepted as an indispensable component of next-generation communication systems due to their broad applications and easy deployment without relying on any infrastructure. Although showing huge benefits, MWNs face many security problems, especially the internal multi-layer security threats being one of the most challenging issues. Since most security mechanisms require the cooperation of nodes, characterizing and learning actions of neighboring nodes and the e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…Rivas et al [11] considered all credit evaluation factors obtained from neighboring vehicles, which may lead to inaccurate credit evaluation and even security problems such as collusion attacks. Lin et al [12] put forward the reputation model based on subjective logic, which mainly uses the theory of subjective logic to quantify the reputation information of nodes. The subjective logic defines the representation and calculation methods of credibility quantitatively.…”
Section: Iov Reputationmentioning
confidence: 99%
“…Rivas et al [11] considered all credit evaluation factors obtained from neighboring vehicles, which may lead to inaccurate credit evaluation and even security problems such as collusion attacks. Lin et al [12] put forward the reputation model based on subjective logic, which mainly uses the theory of subjective logic to quantify the reputation information of nodes. The subjective logic defines the representation and calculation methods of credibility quantitatively.…”
Section: Iov Reputationmentioning
confidence: 99%
“…In the MCC architecture, the application cloud server informs all mobile clients about their assigned data tasks and distributes tasks to mobile clients who meet the requirements of applications. This paper focuses on the internal security threats [25][26][27] that can affect data trustworthiness. The internal threats are launched by an inside attacker who is a legal and certified mobile client.…”
Section: The Adversary Modelmentioning
confidence: 99%
“…In this section, we elaborate on the proposed Data Trustworthiness enhanced Reputation Mechanism (DTRM), which integrates the reputation mechanisms [18,25,27] with the mobile crowd sensing (MCS) [15], metagraph theory [31], data category and user group division technologies [32] to enhance data trustworthiness, defend against the insider threat and enhance the big data veracity in MCC. The DTRM is implemented in mobile sensing devices and cloud service providers to perform bidirectional reputation evaluation.…”
Section: A Data Trustworthiness Enhanced Reputation Mechanism (Dtrm)mentioning
confidence: 99%
“…This paper focuses on the internal security threats [13,14] in MCC that can affect data veracity. The internal threats are launched by an inside attacker who is a legal and certified user.…”
Section: B Adversary Modelmentioning
confidence: 99%