LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment |
Liu, Zhiquan
(School of Computer Science and Technology, Xidian University)
Ma, Jianfeng (School of Computer Science and Technology, Xidian University) Jiang, Zhongyuan (School of Cyber Engineering, Xidian University) Miao, Yinbin (School of Telecommunication Engineering, Xidian University) |
1 | C. Chang, S. Ling and S. Srirama, "Trustworthy service discovery for mobile social network in proximity," in Proc. of IEEE Int. Conf. on Pervasive Computing and Communications, pp. 478- 483, March 24-28, 2014. Article (CrossRef Link) |
2 | Z. Wei, H. Tang, F. R. Yu, M. Wang and P. Mason, “Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning,” IEEE Transactions on Vehicular Technology, vol. 63, no. 9, pp. 4647-4658, November, 2014. Article (CrossRef Link) DOI |
3 | B. Wang, X. Chen and W. Chang, “A light-weight trust-based QoS routing algorithm for ad hoc networks,” Pervasive and Mobile Computing, vol. 13, pp. 164-180, August, 2014. Article (CrossRef Link) DOI |
4 | X. M. Cao, H. T. Zhu, H. Y. Shen and G. H. Chen, "Proxy-based security-feedback trust model in MP2P network," in Proc. of Applied Mechanics and Materials, pp. 1144-1151, February, 2014. Article (CrossRef Link) |
5 | S. Hazra and S. K. Setua, "Probabilistic trust management in wireless communication system," in Proc. of IEEE Int. Conf. on Electrical and Computer Engineering, pp. 54-57, December 20-22, 2014. Article (CrossRef Link) |
6 | W. Jiang, G. Wang and J. Wu, “Generating trusted graphs for trust evaluation in online social networks,” Future Generation Computer Systems, vol. 31, pp. 48-58, February, 2014. Article (CrossRef Link) DOI |
7 | S. Y. Chou, Y. H. Chang and C. Y. Shen, “A fuzzy simple additive weighting system under group decision-making for facility location selection with objective/subjective attributes,” European Journal of Operational Research, vol. 189, no. 1, pp. 132-145, August, 2008. Article (CrossRef Link) DOI |
8 | Q. Han, H. Wen, M. Ren, B. Wu and S. Li, “A topological potential weighted community-based recommendation trust model for P2P networks,” Peer-to-Peer Networking and Applications, pp. 1-11, June, 2014. Article (CrossRef Link) |
9 | L. Tian and W. Jiang, "A multi trust chain scheme in trusted cross-domain interaction," in Proc. of IEEE Int. Conf. on Industrial Control and Electronics Engineering, pp. 550-553, August 23-25, 2012. Article (CrossRef Link) |
10 | T. D. Huynh, N. R. Jennings and N. R. Shadbolt, "Certified reputation: how an agent can trust a stranger," in Proc. of the 5th ACM Int. Joint Conf. on Autonomous Agents and Multiagent Systems, pp. 1217-1224, May 8-12, 2006. Article (CrossRef Link) |
11 | T. D. Huynh, N. R. Jennings and N. R. Shadbolt, “An integrated trust and reputation model for open multi-agent systems,” Autonomous Agents and Multi-Agent Systems, vol. 13, no. 2, pp. 119- 154, March, 2006. Article (CrossRef Link) DOI |
12 | H. T. Nguyen, W. Zhao and J. Yang, "A trust and reputation model based on Bayesian network for web services," in Proc. of IEEE Int. Conf. on Web Services, pp. 251-258, July 5-10, 2010. Article (CrossRef Link) |
13 | A. Jøsang and J. Golbeck, "Challenges for robust trust and reputation systems," in Proc. of the 5th Int. Workshop on Security and Trust Management, September, 2009. Article (CrossRef Link) |
14 | S. Che, R. Feng, X. Liang and X. Wang, “A lightweight trust management based on Bayesian and Entropy for wireless sensor networks,” Security and Communication Networks, vol. 8, no. 2, pp. 168-175, January, 2015. Article (CrossRef Link) DOI |
15 | Number Of Active Mobile Devices Surpasses World Population, 2014. Article (CrossRef Link) |
16 | J. H. Cho, A. Swami and I. R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Communications Surveys and Tutorials, vol. 13, no. 4, pp. 562-583, November, 2011. Article (CrossRef Link) DOI |
17 | Y. Wang and J. Vassileva, "Bayesian network-based trust model," in Proc. of IEEE Int. Conf. on Web Intelligence, pp. 372-378, October 13-17, 2003. Article (CrossRef Link) |
18 | J. Dubey and V. Tokekar, "Bayesian network based trust model with time window for pure P2P computing systems," in Proc. of IEEE Global Conf. on Wireless Computing and Networking, pp. 219-223, December 22-24, 2014. Article (CrossRef Link) |
19 | Z. Wei, H. Tang, F. R. Yuand and P. Mason, "Trust establishment based on Bayesian networks for threat mitigation in mobile ad hoc networks," in Proc. of IEEE Int. Conf. on Military Communications, pp. 171-177, October 6-8, 2014. Article (CrossRef Link) |
20 | G. Liu, Y. Wang and M. A. Orgun, "Trust transitivity in complex social networks," in Proc. of American Association for Artificial Intelligence, vol. 11, pp. 1222-1229, August 7-11, 2011. Article (CrossRef Link) |
21 | A. M. Shabut, K. Dahal and I. Awan, "Friendship based trust model to secure routing protocols in mobile ad hoc networks," in Proc. of IEEE Int. Conf. on Future Internet of Things and Cloud, pp. 280-287, August 27-29, 2014. Article (CrossRef Link) |
22 | R. Deepa and S. Swamynathan, “A trust model for directory-based service discovery in mobile ad hoc networks,” Recent Trends in Computer Networks and Distributed Systems Security, pp. 115-126, March, 2014. Article (CrossRef Link) |
23 | S. K. Dhurandher, M. S. Obaidat, K. Verma, P. Gupta and P. Dhurandher, “Faces: friend-based ad hoc routing using challenges to establish security in MANETs systems,” IEEE Systems Journal, vol. 5, no. 2, pp. 176-188, June, 2011. Article (CrossRef Link) DOI |