Securing OppNets from Packet Integrity Attacks Using Trust and Reputation.
Asma'a AhmadRobin DossMajeed AlajeelyKhlood AhmadPublished in: AINA Workshops (2017)
Keyphrases
- trust evaluation
- trust model
- malicious nodes
- trust and reputation models
- stepping stones
- reputation models
- trust relationships
- trust management
- reputation systems
- reputation management
- wireless sensor networks
- trusted computing
- identity management
- high assurance
- countermeasures
- usage control
- information security
- reputation mechanisms
- normal traffic
- reputation information
- packet loss
- multi agent systems
- security threats
- computer security
- traffic analysis
- integrity constraints
- virtual communities
- watermarking scheme
- network nodes
- security mechanisms
- watermarking algorithm
- network traffic
- access control
- intermediate nodes
- buffer size
- network security
- multiagent systems
- social media