Trust-distortion resistant trust management frameworks on mobile ad hoc networks: A survey

Z Movahedi, Z Hosseini, F Bayan… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Trust management is a promising approach to conduct nodes' transactions and establish
management interactions in distributed mobile ad hoc networks (MANETs) in which nodes' …

A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks

W Zhang, S Zhu, J Tang, N Xiong - The Journal of Supercomputing, 2018 - Springer
With the development of Internet technology, social network has become an important
application in the network life. However, due to the rapid increase in the number of users …

Controversy-adjudication-based trust management mechanism in the internet of underwater things

J Jiang, S Hua, G Han, A Li, C Lin - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Owing to the characteristics of underwater communication, such as limited bandwidth, low
transmission speed, and long delivery delay, it is significantly challenging to address trust …

Detecting unfair recommendations in trust-based pervasive environments

G D'Angelo, F Palmieri, S Rampone - Information Sciences, 2019 - Elsevier
In pervasive/ubiquitous computing environments, interacting users may evaluate their
respective trustworthiness by using historical data coming from their past interactions …

[HTML][HTML] An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks

Y Wang, M Zhang, W Shu - EURASIP Journal on Wireless …, 2018 - Springer
Due to the limitation of battery power, processing capacity, and storage, the sensor nodes
are easy to be captured, destroyed, or attacked in an open environment. As a result, the …

A cognitive chronometry strategy associated with a revised cloud model to deal with the dishonest recommendations attacks in wireless sensor networks

F Khedim, N Labraoui, AAA Ari - Journal of Network and Computer …, 2018 - Elsevier
Wireless sensor networks (WSNs) face many security issues. When external attacks can be
prevented with traditional cryptographic mechanisms; internal attacks remain difficult to be …

Learning automata-based trust model for user recommendations in online social networks

G Lingam, RR Rout, DVLN Somayajulu - Computers & Electrical …, 2018 - Elsevier
Nowadays, most of the online social media websites provide recommendations as service
for selective decision making. Determining a recommended trust path based on the …

An efficient trust‐based secure energy‐aware clustering to mitigate trust distortion attack in mobile ad‐hoc network

AR Rajeswari, S Ganapathy… - Concurrency and …, 2021 - Wiley Online Library
Trust‐aware clustering plays a vital role in addressing the security issues faced by mobile ad‐
hoc networks (MANETs). The trust worthiness of each participated node is to be estimated …

A novel web-enabled healthcare solution on healthvault system

L Liao, M Chen, JJPC Rodrigues, X Lai… - journal of medical …, 2012 - Springer
Abstract Complicated Electronic Medical Records (EMR) systems have created problems in
systems regarding an easy implementation and interoperability for a Web-enabled …

[HTML][HTML] Dynamical trust and reputation computation model for b2c e-commerce

B Tian, K Liu, Y Chen - Future Internet, 2015 - mdpi.com
Trust is one of the most important factors that influence the successful application of network
service environments, such as e-commerce, wireless sensor networks, and online social …