2007 IEEE International Conference on Research, Innovation and Vision for the Future 2007
DOI: 10.1109/rivf.2007.369149
|View full text |Cite
|
Sign up to set email alerts
|

A Bayesian network based trust model for improving collaboration in mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…Examples of such systems can be found in literature; many authors have proposed adaptations of trust models for decentralised architectures. A reputation model adapted to ad-hoc networks for enhancing collaborations is proposed in [18]. For evaluating the relationships among devices in pervasive computing environments, a trust management scheme is introduced in [8], while [1] presents data structures and algorithms for assessing trust in a peer-to-peer environment.…”
Section: Discussionmentioning
confidence: 99%
“…Examples of such systems can be found in literature; many authors have proposed adaptations of trust models for decentralised architectures. A reputation model adapted to ad-hoc networks for enhancing collaborations is proposed in [18]. For evaluating the relationships among devices in pervasive computing environments, a trust management scheme is introduced in [8], while [1] presents data structures and algorithms for assessing trust in a peer-to-peer environment.…”
Section: Discussionmentioning
confidence: 99%
“…A similar study was done in [9], resulting to a trust model where the negotiation of trust between devices is based on their security properties. Similarly, a trust model was proposed in [10] for enhancing the collaborations in mobile ad hoc networks. In paper [11], the focus was on using trust as a means for enhancing the quality of interactions and services between devices, whereas in [12], the proposed trust model relies on a communication control mechanism used to monitor the data traffic between trusted devices in the network.…”
Section: Related Workmentioning
confidence: 99%
“…In paper [11], the focus was on using trust as a means for enhancing the quality of interactions and services between devices, whereas in [12], the proposed trust model relies on a communication control mechanism used to monitor the data traffic between trusted devices in the network. Other trust models were suggested, where the trust evaluation is based on establishing dynamic access rights between devices [13], devices' experience, knowledge, and recommendations [14], decomposition of the computing environment into several ad hoc networks [7], statistics and probability theories [10], [15], using recommendations as a way for enhancing trust evaluation [16], [17]. The latter series of papers also discuss typical attacks targeted against trust management systems, and provide protection methods to defend against them.…”
Section: Related Workmentioning
confidence: 99%
“…[9] In addition to existing scattered definitions of trust, models for expressing trust involved in networked systems also lack coherence and consistency. Examples of the main formal techniques for modeling trust include fuzzy logic [10,11,12,13,14,15,16,17,18], subjective logic [19,20,21,22,23,24,25,26,27,28,29], Dempster-Shafer theory [30,31,32,33,34,35], ratings [36,37,38,39,40], weighting [41,42,43,44,45], neural network [46,47], Bayesian networks [48,49,50,51], game theory [52,53], swarm intelligence [54,55,56,57...…”
Section: Introductionmentioning
confidence: 99%