2014 11th International Symposium on Wireless Communications Systems (ISWCS) 2014
DOI: 10.1109/iswcs.2014.6933495
|View full text |Cite
|
Sign up to set email alerts
|

Modelling trust in random wireless networks

Abstract: We present an analysis of the probability that a set of devices capable of communicating wirelessly can form a fully connected, trusted network. The network model that is used accounts for the geometric properties of the physical network boundaries, the statistical nature of the propagation environment, and the notion that both trustworthy and untrustworthy devices may occupy the network domain. Two local (pairwise) trust models are explored in the context of this model: proximitybased trust, where trust betwe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…In mobile social networks, the trust degree can be measured based on the previous behaviors of nodes [17,19,20]. One node measures the trust degree using either direct information from previous interactions of other nodes or indirect information from the accumulated observations of behaviors at the other nodes.…”
Section: Trust Degreesmentioning
confidence: 99%
“…In mobile social networks, the trust degree can be measured based on the previous behaviors of nodes [17,19,20]. One node measures the trust degree using either direct information from previous interactions of other nodes or indirect information from the accumulated observations of behaviors at the other nodes.…”
Section: Trust Degreesmentioning
confidence: 99%
“…A passive monitoring of forwarded data traffic to estimate the behavior of a node without buffer was proposed in [19]. The proximity based trust and experience-based trust modelings in random wireless networks were proposed in [22]. The selective packet drop behavior in the selfish relay has been studied in [23] for route selection, which ignored the effects of connectivity and delay.…”
Section: B Related Workmentioning
confidence: 99%
“…First, by using the mathematical definition of trusted connection in [26] -specifically, two nodes can establish a trusted connection if they can communicate and trust each other -then the T-CP can be defined as:…”
Section: Trusted Connection Probabilitymentioning
confidence: 99%