{"title":"移动自组网中的信任管理","authors":"Michail Chatzidakis, S. Hadjiefthymiades","doi":"10.1109/NETWKS.2014.6958525","DOIUrl":null,"url":null,"abstract":"We investigate an approach to trust management in a mobile ad-hoc network by first clustering the network in an efficient manner based on the cost of analysis/processing concept, and then using the experience of some nodes to achieve trust information dissemination through the network. This is accomplished by first exchanging trust information between the nodes and the cluster-head when the cluster is initially formed, and later (on demand) when a client consults the cluster-head prior to proceeding with a transaction. We also examine a possible scenario for trust restoration if a node is found to be in low trust due to former malicious behavior.","PeriodicalId":410892,"journal":{"name":"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":"{\"title\":\"Trust management in mobile ad hoc networks\",\"authors\":\"Michail Chatzidakis, S. Hadjiefthymiades\",\"doi\":\"10.1109/NETWKS.2014.6958525\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We investigate an approach to trust management in a mobile ad-hoc network by first clustering the network in an efficient manner based on the cost of analysis/processing concept, and then using the experience of some nodes to achieve trust information dissemination through the network. This is accomplished by first exchanging trust information between the nodes and the cluster-head when the cluster is initially formed, and later (on demand) when a client consults the cluster-head prior to proceeding with a transaction. We also examine a possible scenario for trust restoration if a node is found to be in low trust due to former malicious behavior.\",\"PeriodicalId\":410892,\"journal\":{\"name\":\"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"24\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NETWKS.2014.6958525\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NETWKS.2014.6958525","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We investigate an approach to trust management in a mobile ad-hoc network by first clustering the network in an efficient manner based on the cost of analysis/processing concept, and then using the experience of some nodes to achieve trust information dissemination through the network. This is accomplished by first exchanging trust information between the nodes and the cluster-head when the cluster is initially formed, and later (on demand) when a client consults the cluster-head prior to proceeding with a transaction. We also examine a possible scenario for trust restoration if a node is found to be in low trust due to former malicious behavior.