Proceedings of the 3rd ACM Workshop on Wireless Security 2004
DOI: 10.1145/1023646.1023648
|View full text |Cite
|
Sign up to set email alerts
|

Trust evaluation in ad-hoc networks

Abstract: An important concept in network security is trust, interpreted as a relation among entities that participate in various protocols. Trust relations are based on evidence related to the previous interactions of entities within a protocol. In this work, we are focusing on the evaluation process of trust evidence in Ad Hoc Networks. Because of the dynamic nature of Ad Hoc Networks, trust evidence may be uncertain and incomplete. Also, no pre-established infrastructure can be assumed. The process is formulated as a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
107
0
3

Year Published

2005
2005
2014
2014

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 199 publications
(110 citation statements)
references
References 29 publications
0
107
0
3
Order By: Relevance
“…The contribution considers not only the trust level of others but also the accuracy and the relationship maturity. The accuracy of a trust level is defined by the standard deviation, similar to Theodorakopoulos and Baras [4]. The value in the trust level table of node a regarding node b is associated to a standard deviation σ a (b), which refers to the variations of the trust level that node a has observed about node b.…”
Section: B Contribution Computationmentioning
confidence: 99%
“…The contribution considers not only the trust level of others but also the accuracy and the relationship maturity. The accuracy of a trust level is defined by the standard deviation, similar to Theodorakopoulos and Baras [4]. The value in the trust level table of node a regarding node b is associated to a standard deviation σ a (b), which refers to the variations of the trust level that node a has observed about node b.…”
Section: B Contribution Computationmentioning
confidence: 99%
“…Different research papers have been dedicated to find a solution to these problems. Many recent works deal with reputation mechanisms ( [20], [1], [9]) and trust evaluation ( [16], [17]) to manage the confidence in the source of information. Others were interested in data aggregation without taking into account the source [2] [3][10] [13].…”
Section: Introductionmentioning
confidence: 99%
“…More and more use of internet is done by managers, workers, branch offices and business tycoons to remotely connect to their networks and to perform commercial transactions via the World Wide Web [3].Due to wide use of internet by common man for personal work and tremendous use by business persons, internet is very prone to threat attacks. Although network attacks are presumably more serious when they are inflicted upon businesses that store sensitive data, such as personal medical or financial records, the important data can be lost, privacy can be violated [4].An ad-hoc network is a collection of autonomous nodes or terminals that communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. Each node functions as both a host and a router.…”
Section: Introductionmentioning
confidence: 99%