2010
DOI: 10.1002/wcm.1059
|View full text |Cite
|
Sign up to set email alerts
|

Proximity based trust‐advisor using encounters for mobile societies: Analysis of four filters

Abstract: Many interactions between network users rely on trust, which is becoming particularly important given the security breaches in the Internet today. These problems are further exacerbated by the dynamics in wireless mobile networks. In this paper, we address the issue of trust advisory and its establishment in mobile networks, with application to ad hoc networks, including delay tolerant (DTNs). We utilize encounters in mobile societies in novel ways, noticing that mobility provides opportunities to build proxim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
14
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(18 citation statements)
references
References 23 publications
1
14
0
Order By: Relevance
“…SMILE [6] uses Bluetooth communication and standard cryptographic primitives to mimic the behavior of users in existing missed-connections services such as Craigslist. In [12] the authors constructed a flexible framework for secure mobile social networks, [13] addressed the issue of trust advisory and establishment in mobile networks.…”
Section: Related Workmentioning
confidence: 99%
“…SMILE [6] uses Bluetooth communication and standard cryptographic primitives to mimic the behavior of users in existing missed-connections services such as Craigslist. In [12] the authors constructed a flexible framework for secure mobile social networks, [13] addressed the issue of trust advisory and establishment in mobile networks.…”
Section: Related Workmentioning
confidence: 99%
“…This problem has attracted the attention of research communities [8][9][10][11][12][13]. The trusted computing group (TCG) [8] has proposed a trusted computing platform (TCP) based on the trusted platform module (TPM) [14] cryptographic microcontroller system.…”
Section: Problem Statementmentioning
confidence: 99%
“…These three matrices are orthogonal to each other and can be combined with different weights according to different requirements. In the state of the art, there are a number of various proposals primarily aimed at evaluating QoS trust [1], with some proposals addressing social and similarity trust [20], [21].…”
Section: Introductionmentioning
confidence: 99%
“…State of the art addresses this by a) allowing a user to name his/her social friends manually [20], b) by importing social friendships from social networks or e.g. from a phonebook [15] and considering transitivity of trust through friendship chains [7], and c) by finding familiar people by looking at the encounter times or similarity scores [21]. The first two approaches need the user's manual intervention.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation