2010
DOI: 10.1109/tnsm.2010.1009.i9p0339
|View full text |Cite
|
Sign up to set email alerts
|

Trust management in mobile ad hoc networks using a scalable maturity-based model

Abstract: International audienceIn this paper, we propose a human-based model which builds a trust relationship between nodes in an ad hoc network. The trust is based on previous individual experiences and on the recommendations of others. We present the Recommendation Exchange Protocol (REP) which allows nodes to exchange recommendations about their neighbors. Our proposal does not require disseminating the trust information over the entire network. Instead, nodes only need to keep and exchange trust information about … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
126
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 155 publications
(126 citation statements)
references
References 31 publications
0
126
0
Order By: Relevance
“…We have also presented a security analysis of the protocol, showing that the protocol has desirable features of anonymity, accountability and reliability in trust query and reporting processes. Our protocol is feasible for most of global reputation-best trust models, such as Trust [9], GTMS [10] and REP [11].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…We have also presented a security analysis of the protocol, showing that the protocol has desirable features of anonymity, accountability and reliability in trust query and reporting processes. Our protocol is feasible for most of global reputation-best trust models, such as Trust [9], GTMS [10] and REP [11].…”
Section: Discussionmentioning
confidence: 99%
“…And (2) how to distribute, store, and access the trust value of peers securely [6]- [8]. A fair amount of work has been done related to the first issue [9]- [11]. However, The research in developing secure mechanisms of distribution and access trust value related to the second issue is scanty.…”
Section: Introductionmentioning
confidence: 99%
“…To increase the flexibility of network computing systems, many researchers have proposed trust-based approaches, i.e., the trust information sharing mechanisms, algorithms for selecting entities to trust, evaluation mechanisms and so on in distributed systems, such as peer-topeer networks [2,3,17] , ad hoc sensor network [18] , ubiquitous computing, and electronic commerce communities. However, due to the uncertainty of the trust cognition and the inherent human subjective nature in the trust evaluation, there are still big challenges needed to be addressed.…”
Section: Trust and Reputation Modelsmentioning
confidence: 99%
“…In some previous protocols [4,3], nodes themselves initiate requests to obtain trust metadata created by other nodes (recommendations). Requests are sent and replies are received based on the recommendation trust values of nodes, i.e., trust metadata for providing correct recommendations.…”
Section: Related Workmentioning
confidence: 99%
“…A trust management framework [1][2][3][4][5] is useful to ensure proper functioning of a mobile ad-hoc network (MANET). Nodes in a MANET generally lack hardware support for tamper resistance.…”
Section: Introductionmentioning
confidence: 99%