Proceedings of the 1st International ICST Conference on Autonomic Computing and Communication Systems 2007
DOI: 10.4108/icst.autonomics2007.2260
|View full text |Cite
|
Sign up to set email alerts
|

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices

Abstract: Research on trust management systems for wireless sensor networks is still at a very early stage and few works have done so far. It seems that for those works which deal with the topic general features of how these systems should be are not clearly identified. In this paper we try to identify the main features that a trust management system should have and justify their importance for future developments.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…The results are presented in Figs. 10,11,12 and are similar to sinkhole. Unlike in sinkhole, the analysis to detect selective forwarding attack is performed over five rounds by the mobile-node.…”
Section: Simulation Resultsmentioning
confidence: 77%
See 1 more Smart Citation
“…The results are presented in Figs. 10,11,12 and are similar to sinkhole. Unlike in sinkhole, the analysis to detect selective forwarding attack is performed over five rounds by the mobile-node.…”
Section: Simulation Resultsmentioning
confidence: 77%
“…the onus of identifying such mal-intent is left to the sensor nodes. There have been numerous reputation-based systems, which use this methodology attempting to solve the problem of intrusion detection and mal-behavior detection of sensor nodes [2,3,11]. Krontiris et al design an IDS to detect specifically sinkhole attacks [5].…”
mentioning
confidence: 99%
“…The honesty issue has been recognized in ubiquitous systems and is labeled as extremely important property of any trust management system for ubiquitous applications [8,19,23]. Because of subverted nodes, other nodes are faced with the problem of distinguishing honest from dishonest recommendations.…”
Section: Honesty Filteringmentioning
confidence: 99%
“…In turn, trust and reputation management has captured the attention of several research groups from both industry and academia in the recent years, leading to a current solid as well as promising research field.…”
Section: Introductionmentioning
confidence: 99%