2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing 2006
DOI: 10.1109/dasc.2006.28
|View full text |Cite
|
Sign up to set email alerts
|

DRBTS: Distributed Reputation-based Beacon Trust System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
147
0
6

Year Published

2008
2008
2018
2018

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 157 publications
(153 citation statements)
references
References 7 publications
0
147
0
6
Order By: Relevance
“…In literature, some rating approaches use a single value, called reputation, like CORE [5] and DRBTS [74]. This is similar to our approach in CRATER where we use a single value called the risk value, ri,j.…”
Section: Rating Approachmentioning
confidence: 95%
See 1 more Smart Citation
“…In literature, some rating approaches use a single value, called reputation, like CORE [5] and DRBTS [74]. This is similar to our approach in CRATER where we use a single value called the risk value, ri,j.…”
Section: Rating Approachmentioning
confidence: 95%
“…In [74] authors propose a reputation based scheme called Distributed Reputation-based Beacon Trust System (DRBTS) for excluding malicious Beacon Nodes(BNs) that provide false location information. It is a distributed security protocol aimed at providing a method by which BNs can monitor each other and provide information so that the Sensor Nodes(SNs) can choose who to trust, based on a quorum voting approach.…”
Section: Drbts -Distributed Reputation-based Beacon Trust Systemmentioning
confidence: 99%
“…In this way, an IT device can be judged trustworthy through a network of sensors using a reputation-checking algorithm. For example, beacon nodes on Wireless Sensor Networks can be evaluated on whether they are providing accurate location identification by 1-hop neighboring nodes [88]. Autonomous trustworthiness-evaluation and -judgment is important when networks are vulnerable to malicious interference.…”
Section: Who or What Is Trustworthy?mentioning
confidence: 99%
“…Abort from the above the authors [22][23][24][25] proposed trust based secure routing for mobile ad hoc networks based on either direct or in direct trust and both trust establishment mechanisms.…”
Section: Related Workmentioning
confidence: 99%