International audienceInteractions between entities unknown to each other are inevitable in the ambient intelligence vision of service access anytime, anywhere. Trust management through a reputation mechanism to facilitate such interactions is recognized as a vital part of mobile ad hoc networks, which features lack of infrastructure, autonomy, mobility and resource scarcity of composing light-weight terminals. However, the design of a reputation mechanism is faced by challenges of how to enforce reputation information sharing and honest recommendation elicitation. In this paper, we present a reputation model, which incorporates two essential dimensions, time and context, along with mechanisms supporting reputation formation, evolution and ...
Mobile ad-hoc networks rely on the cooperation of nodes for routing and forwarding. For individual n...
Countermeasures for node misbehavior and selfishness are mandatory requirements in MANET. Selfishnes...
In recent years, several trust and reputation models have been proposed to enhance the security of m...
International audienceThe vision of ubiquitous computing is becoming a reality thanks to the advent ...
Reputation systems in mobile ad-hoc networks can be tricked by the spreading of false reputation rat...
International audienceIn a mobile ad hoc network we consider the problem of designing a reputation s...
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article dis...
This paper is concerned with fully distributed reputation-based mechanisms that improve security in ...
Recently several trust and reputation models have been proposed to enhance the security of mobile ad...
Recently several trust and reputation models have been proposed to enhance the security of mobile ad...
The use of mobile ad-hoc networks (MANETs) is growing. The issue of security in MANETs is not trivia...
The establishment of trust in vehicular ad hoc networks (VANETs) will require the application of non...
International audienceReputation systems allow to estimate the trustworthiness of entities based on ...
This paper presents a new approach to assign trust levels in ad hoc networks. Our system is inspired...
The mobile ad hoc network (MANET) is more vulnerable to attacks than traditional networks, due to th...
Mobile ad-hoc networks rely on the cooperation of nodes for routing and forwarding. For individual n...
Countermeasures for node misbehavior and selfishness are mandatory requirements in MANET. Selfishnes...
In recent years, several trust and reputation models have been proposed to enhance the security of m...
International audienceThe vision of ubiquitous computing is becoming a reality thanks to the advent ...
Reputation systems in mobile ad-hoc networks can be tricked by the spreading of false reputation rat...
International audienceIn a mobile ad hoc network we consider the problem of designing a reputation s...
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article dis...
This paper is concerned with fully distributed reputation-based mechanisms that improve security in ...
Recently several trust and reputation models have been proposed to enhance the security of mobile ad...
Recently several trust and reputation models have been proposed to enhance the security of mobile ad...
The use of mobile ad-hoc networks (MANETs) is growing. The issue of security in MANETs is not trivia...
The establishment of trust in vehicular ad hoc networks (VANETs) will require the application of non...
International audienceReputation systems allow to estimate the trustworthiness of entities based on ...
This paper presents a new approach to assign trust levels in ad hoc networks. Our system is inspired...
The mobile ad hoc network (MANET) is more vulnerable to attacks than traditional networks, due to th...
Mobile ad-hoc networks rely on the cooperation of nodes for routing and forwarding. For individual n...
Countermeasures for node misbehavior and selfishness are mandatory requirements in MANET. Selfishnes...
In recent years, several trust and reputation models have been proposed to enhance the security of m...