Guard your connections: infiltration of a trust/reputation based network.
Malik Magdon-IsmailBrian OrecchioPublished in: WebSci (2012)
Keyphrases
- trust relationships
- trust model
- trust evaluation
- trust management
- network structure
- network model
- reputation models
- malicious nodes
- trust and reputation models
- reputation management
- neighboring nodes
- reputation systems
- wireless sensor networks
- network architecture
- communication cost
- reputation mechanisms
- communication networks
- network traffic
- complex networks
- end to end
- usage control
- digital libraries