2013
DOI: 10.1007/978-3-642-34952-2_12
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient, Secure and User Privacy-Preserving Search Protocol for Peer-to-Peer Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 51 publications
0
2
0
Order By: Relevance
“…Using the concepts of reputation and trust, a node can be mapped to a particular level of trustworthiness. On the basis of the information that the node has shared with other nodes regarding its spectrum sensing information, the trust and reputation metrics are computed for a node (Sen, 2010c;Sen, 2013). If the information shared by the node is found to be incorrect after a certain number of iterations by its neighbors, the node is considered to be malicious and appropriate security policies are applied to deal with the identified malicious node.…”
Section: Reputation-and Trust-based Security Systemsmentioning
confidence: 99%
“…Using the concepts of reputation and trust, a node can be mapped to a particular level of trustworthiness. On the basis of the information that the node has shared with other nodes regarding its spectrum sensing information, the trust and reputation metrics are computed for a node (Sen, 2010c;Sen, 2013). If the information shared by the node is found to be incorrect after a certain number of iterations by its neighbors, the node is considered to be malicious and appropriate security policies are applied to deal with the identified malicious node.…”
Section: Reputation-and Trust-based Security Systemsmentioning
confidence: 99%
“…The demand for privacy of digital data and of algorithms for handling more complex structures have increased exponentially over the last decade. This goes in parallel with the growth in communication networks and their devices and their increasing capabilities (Sen, 2013a;Sen, 2012d;Sen, 2012c;Bandyopadhyay & Sen, 2011;Sen, 2011b;Sen, 2011c;Sen, 2010c). At the same time, these devices and networks are subject to a great variety of attacks involving manipulation and destruction of data and theft of sensitive information (Sen, 2013b;Sen, 2012e;Sen, 2011d;Sen, 2010d;Sen et al, 2007a;Sen et al, 2007b;Sen et al, 2007c;Sen et al, 2006).…”
Section: Introductionmentioning
confidence: 99%