Trust computations and trust dynamics in mobile adhoc networks: A survey
Trust is an important aspect of mobile adhoc networks (MANETs). It enables entities to cope
with uncertainty and uncontrollability caused by the free will of others. Trust computations …
with uncertainty and uncontrollability caused by the free will of others. Trust computations …
Trust prediction and trust-based source routing in mobile ad hoc networks
Mobile ad hoc networks (MANETs) are spontaneously deployed over a geographically
limited area without well-established infrastructure. The networks work well only if the mobile …
limited area without well-established infrastructure. The networks work well only if the mobile …
Trust management and reputation systems in mobile participatory sensing applications: A survey
Participatory sensing is an emerging paradigm in which citizens everywhere voluntarily use
their computational devices to capture and share sensed data from their surrounding …
their computational devices to capture and share sensed data from their surrounding …
Security of online reputation systems: The evolution of attacks and defenses
The Internet has created vast opportunities to interact with strangers. The interactions can be
fun, informative, and even profitable [1]. However, there is also risk involved. Will an eBay …
fun, informative, and even profitable [1]. However, there is also risk involved. Will an eBay …
AutoTrust: A privacy-enhanced trust-based intrusion detection approach for internet of smart things
Abstract Internet of Cloud Things (IoCT) is a new era of technology introduced as an
extension to Internet of Things (IoT). IoT itself is a complex and heterogeneous network that …
extension to Internet of Things (IoT). IoT itself is a complex and heterogeneous network that …
Review of Detection of Packets Inspection and Attacks in Network Security
SK Jajula, K Tripathi, SB Bajaj - … in Data Mining and Information Security …, 2022 - Springer
In this paper, different types of attacks and their malicious act behind the scenes are
presented. The solutions to defend the victim against attacks are given. In today's scenario …
presented. The solutions to defend the victim against attacks are given. In today's scenario …
A reputation-based trust evaluation model in group decision-making framework
In group decision-making (GDM) problems, experts need to communicate and adjust their
opinions in order to achieve consensus on the final decision-making output. Since experts …
opinions in order to achieve consensus on the final decision-making output. Since experts …
Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs
BJ Chang, SL Kuo - IEEE Transactions on Vehicular …, 2008 - ieeexplore.ieee.org
To increase efficiency in mobile ad hoc networks (MANETs), the multicast MANET is
proposed for a sender that sends packets to several receivers through a multicast session. In …
proposed for a sender that sends packets to several receivers through a multicast session. In …
Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory
Owing to the openness in network topology and the absence of centralised administration in
management, mobile ad hoc network (MANET) is vulnerable to attacks from malicious …
management, mobile ad hoc network (MANET) is vulnerable to attacks from malicious …
A subjective trust management model with multiple decision factors for MANET based on AHP and fuzzy logic rules
A mobile ad hoc network (MANET) is a self-organized system comprised by multiple mobile
wireless nodes. Due to the openness in network topology and the absence of centralized …
wireless nodes. Due to the openness in network topology and the absence of centralized …