2008 Second Asia International Conference on Modelling &Amp; Simulation (AMS) 2008
DOI: 10.1109/ams.2008.113
|View full text |Cite
|
Sign up to set email alerts
|

Towards Identifying Features of Trust in Mobile Ad Hoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2011
2011

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Ukil et al in [22] summarize both points of view as: trust collects, encodes, analyzes, and presents evidence that is related to competence, honesty, security or dependability with the purpose that all activity in a network can be carried as securely as possible. Samian et al [23] and Gai et al [24] argue that before trust the most common mechanism to secure routing protocols was to use cryptographic approaches. However because of the ever-increasing number and sophistication of attacks, cryptographic approaches can no longer be considered to be the sole solution to protect wireless networks.…”
Section: Benefits Of Using Trust-based Approaches For Routing In Amentioning
confidence: 99%
“…Ukil et al in [22] summarize both points of view as: trust collects, encodes, analyzes, and presents evidence that is related to competence, honesty, security or dependability with the purpose that all activity in a network can be carried as securely as possible. Samian et al [23] and Gai et al [24] argue that before trust the most common mechanism to secure routing protocols was to use cryptographic approaches. However because of the ever-increasing number and sophistication of attacks, cryptographic approaches can no longer be considered to be the sole solution to protect wireless networks.…”
Section: Benefits Of Using Trust-based Approaches For Routing In Amentioning
confidence: 99%
“…Thus, there are significant costs to apply trust evaluations and it is important to find the right balance. Samian et al [18] elaborate how to represent a node's trust properties in the trust evaluation process and what criteria can work as reliable features or evidences to determine the node's trust.…”
Section: Related Workmentioning
confidence: 99%