2011
DOI: 10.1108/10662241111123739
|View full text |Cite
|
Sign up to set email alerts
|

Trust and reputation models comparison

Abstract: Purpose -The purpose of this paper is to analyse and describe several trust and reputation models for distributed and heterogeneous networks and compare some of them in order to provide an evaluation amongst some of the most relevant works in this field. Design/methodology/approach -The authors have developed a trust and reputation models simulator for wireless sensor networks, called TRMSim-WSN, and implemented several trust models for distributed networks in order to test their accuracy as well as their resi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…Moreover, trust always involves accepting a certain level of risk and becoming vulnerable to a trusted party [25]. This acceptance of risk is based on the expectation that the trusted party will perform actions that are important or beneficial to the vulnerable one [8,26]. Therefore, trust is a relative term based on actions between the parties involved [14], and it emerges if all the risks in a system are understood by all the players.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Moreover, trust always involves accepting a certain level of risk and becoming vulnerable to a trusted party [25]. This acceptance of risk is based on the expectation that the trusted party will perform actions that are important or beneficial to the vulnerable one [8,26]. Therefore, trust is a relative term based on actions between the parties involved [14], and it emerges if all the risks in a system are understood by all the players.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Even network simulators specifically designed to test trust and reputation approaches have been developed , allowing this way a comprehensive analysis and comparison amongst different proposals .…”
Section: Introductionmentioning
confidence: 99%
“…Many papers try to analyse TRM systems in the context of resilience to a certain attacks, but this can be perceived as an example of a reactive approach which is based on detection of certain attack signature [2], [13], [17], [20]- [22]. Such approach has very important disadvantages, more comprehensive described in [8].…”
Section: Related Workmentioning
confidence: 99%