Trust-distortion resistant trust management frameworks on mobile ad hoc networks: A survey
Z Movahedi, Z Hosseini, F Bayan… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Trust management is a promising approach to conduct nodes' transactions and establish
management interactions in distributed mobile ad hoc networks (MANETs) in which nodes' …
management interactions in distributed mobile ad hoc networks (MANETs) in which nodes' …
A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks
W Zhang, S Zhu, J Tang, N Xiong - The Journal of Supercomputing, 2018 - Springer
With the development of Internet technology, social network has become an important
application in the network life. However, due to the rapid increase in the number of users …
application in the network life. However, due to the rapid increase in the number of users …
Controversy-adjudication-based trust management mechanism in the internet of underwater things
Owing to the characteristics of underwater communication, such as limited bandwidth, low
transmission speed, and long delivery delay, it is significantly challenging to address trust …
transmission speed, and long delivery delay, it is significantly challenging to address trust …
Detecting unfair recommendations in trust-based pervasive environments
In pervasive/ubiquitous computing environments, interacting users may evaluate their
respective trustworthiness by using historical data coming from their past interactions …
respective trustworthiness by using historical data coming from their past interactions …
[HTML][HTML] An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks
Y Wang, M Zhang, W Shu - EURASIP Journal on Wireless …, 2018 - Springer
Due to the limitation of battery power, processing capacity, and storage, the sensor nodes
are easy to be captured, destroyed, or attacked in an open environment. As a result, the …
are easy to be captured, destroyed, or attacked in an open environment. As a result, the …
A cognitive chronometry strategy associated with a revised cloud model to deal with the dishonest recommendations attacks in wireless sensor networks
Wireless sensor networks (WSNs) face many security issues. When external attacks can be
prevented with traditional cryptographic mechanisms; internal attacks remain difficult to be …
prevented with traditional cryptographic mechanisms; internal attacks remain difficult to be …
Learning automata-based trust model for user recommendations in online social networks
Nowadays, most of the online social media websites provide recommendations as service
for selective decision making. Determining a recommended trust path based on the …
for selective decision making. Determining a recommended trust path based on the …
An efficient trust‐based secure energy‐aware clustering to mitigate trust distortion attack in mobile ad‐hoc network
AR Rajeswari, S Ganapathy… - Concurrency and …, 2021 - Wiley Online Library
Trust‐aware clustering plays a vital role in addressing the security issues faced by mobile ad‐
hoc networks (MANETs). The trust worthiness of each participated node is to be estimated …
hoc networks (MANETs). The trust worthiness of each participated node is to be estimated …
A novel web-enabled healthcare solution on healthvault system
L Liao, M Chen, JJPC Rodrigues, X Lai… - journal of medical …, 2012 - Springer
Abstract Complicated Electronic Medical Records (EMR) systems have created problems in
systems regarding an easy implementation and interoperability for a Web-enabled …
systems regarding an easy implementation and interoperability for a Web-enabled …
[HTML][HTML] Dynamical trust and reputation computation model for b2c e-commerce
B Tian, K Liu, Y Chen - Future Internet, 2015 - mdpi.com
Trust is one of the most important factors that influence the successful application of network
service environments, such as e-commerce, wireless sensor networks, and online social …
service environments, such as e-commerce, wireless sensor networks, and online social …