2010
DOI: 10.5121/ijasuc.2010.1301
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Trust Models in Different Network Domains

Abstract: This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a secure system, they are not the same. The difference between reputation and trust is also explained, highlighting that reputation partially affects trust. A survey of trust and reputation systems in various domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0
1

Year Published

2012
2012
2019
2019

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 96 publications
(60 citation statements)
references
References 99 publications
0
59
0
1
Order By: Relevance
“…Another model which can be used is to use a trust agent which acts as a broker; however when the aggregate agent tries to communicate with the sensing agent in order to collect its data it will be checked by the trust agent which will decide if it is trusted or not according to its tag and policies. However these are just examples to illustrate the trust between aggregate and sensing agents, many other models can be used [18].…”
Section: Building Trust Between Agentsmentioning
confidence: 99%
“…Another model which can be used is to use a trust agent which acts as a broker; however when the aggregate agent tries to communicate with the sensing agent in order to collect its data it will be checked by the trust agent which will decide if it is trusted or not according to its tag and policies. However these are just examples to illustrate the trust between aggregate and sensing agents, many other models can be used [18].…”
Section: Building Trust Between Agentsmentioning
confidence: 99%
“…Generally, as any wireless sensor network built in a harsh environment the proposed system is exposed to security attacks such as DOS, wormhole, Sybil attack, hello flood and nodecapturing attacks. The use of cryptographic algorithms alone cannot encounter and cope with the various types of attacks, so building trust between several nodes within the network is important to distinguish legitimate nodes from malicious ones [6].…”
Section: Security In Wireless Sensor Networkmentioning
confidence: 99%
“…Different trust models have been proposed to provide an ultimate mechanism for detecting malicious nodes within WSN. All of the proposed trust models based on calculating www.ijacsa.thesai.org trust rate for every node within the system depending on its behavior which is captured by either direct or indirect fashion, depending on these rates the controller or director decide to consider a node as legitimate node and in result raise its trust rate or it could be a layer and punished by reducing its trust rate, if the rate decreased below a specific threshold the node may be discarded or monitored to be treated later [6].…”
Section: Behavior Prediction In Wsn Using Rbannmentioning
confidence: 99%
See 1 more Smart Citation
“…Studying the trusted node or trusted path model [5] differs from studying the security models in WSNs [6]. Security models address the preservation of a network from malicious nodes that may attack the network and strain their resources.…”
Section: Introductionmentioning
confidence: 99%