2017
DOI: 10.1016/j.pmcj.2016.09.016
|View full text |Cite
|
Sign up to set email alerts
|

Trust and reputation management for opportunistic dissemination

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…Under the model, each entity should communicate with as many entities as possible to obtain more accurate verification and reputation calculation. By considering majority opinions from others, Ciobanu et al [27] investigate the security aspects of employing intermediate nodes on the delay-tolerant network (DTN). They propose opportunistic trust and reputation management called SAROS in order to detect and avoid malicious nodes by comparing several contents coming from various nodes within an interest-space.…”
Section: B Evaluation Of Reputationmentioning
confidence: 99%
See 1 more Smart Citation
“…Under the model, each entity should communicate with as many entities as possible to obtain more accurate verification and reputation calculation. By considering majority opinions from others, Ciobanu et al [27] investigate the security aspects of employing intermediate nodes on the delay-tolerant network (DTN). They propose opportunistic trust and reputation management called SAROS in order to detect and avoid malicious nodes by comparing several contents coming from various nodes within an interest-space.…”
Section: B Evaluation Of Reputationmentioning
confidence: 99%
“…However, intuitively trust computation that relies on the number of participants is vulnerable to collusion attacks. Moreover, without verifying entities, e.g., identity, location, etc., the previous trust evaluations in [27] and [28] will be useless in case of adversaries launching Sybil attacks.…”
Section: B Evaluation Of Reputationmentioning
confidence: 99%
“…The resilience of this protocol against other attacks such as bad or good mouthing, black hole attack, has not been studied. Ciobanu et al [18] proposed a trust and reputation management mechanism (called SAROS) for OppNets. Trust is computed as local and global and a quorum-based algorithm is used for deciding the correctness of the received messages.…”
Section: Trust-based Approachesmentioning
confidence: 99%
“…Beyond mobile crowdsensing, the notion of computational trust has been employed to solve many research problems related to the QoI, including e-commerce [93,124]. Among the fields closely related to mobile crowdsensing, we include sensor networks [9,83,84,137,163], opportunistic networks [32,99,153,198], and social networks [59,197], to name a few. However, establishing trust in mobile crowdsensing poses some unique challenges that cannot be addressed solely with existing trust frameworks.…”
Section: Related Workmentioning
confidence: 99%