214
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Cosine similarity-based clustering and dynamic reputation trust aware key generation scheme for trusted communication on social networking

, &
Pages 3247-3258 | Received 22 Jan 2014, Accepted 08 Sep 2014, Published online: 30 Sep 2014

References

  • Ellison NB. Social network sites: definition, history, and scholarship. J Comput Mediat Commun. 2007;13:210–230. doi: 10.1111/j.1083-6101.2007.00393.x
  • Tajeddine A, Kayssi A, Chehab A, Artail H. Fuzzy reputation-based trust model. Appl Soft Comput. 2011;11:345–355. doi: 10.1016/j.asoc.2009.11.025
  • Ding Q, Li X, Jiang M, Zhou X. Reputation-based trust model in vehicular ad hoc networks. Paper presented at: 2010 International Conference on Wireless Communications and Signal Processing (WCSP); 2014 Oct 23–25; Hefei, China. 2010. p. 1–6.
  • Nguyen HT, Zhao W, Yang J. A trust and reputation model based on Bayesian network for Web services. Paper presented at: 2010 IEEE International Conference on Web Services (ICWS). 8th Meeting; 2010 July 5–10; Miami, FL, USA. 2010. p. 251–258.
  • Luo J, Liu X, Fan M. A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput Netw. 2009;53:2396–2407. doi: 10.1016/j.comnet.2009.04.008
  • Das A, Islam MM. Securedtrust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans Depend Secure Comput. 2012;9:261–274. doi: 10.1109/TDSC.2011.57
  • Hasan O, Brunie L, Bertino E, Shang N. A decentralized privacy preserving reputation protocol for the malicious adversarial model. IEEE Trans Infor Forensics Secur. 2013;8:949–962.
  • Chung JY, Park B, Won YJ, Strassner J, Hong JW. An effective similarity metric for application traffic classification. Paper presented at: 2010 IEEE Network Operations and Management Symposium (NOMS). 12th Meeting; 2010 April 19–23; Osaka, Japan. 2010. p. 286–292.
  • Chang L, Ouzrout Y, Nongaillard A, Bouras A, Jiliu Z. Multi-criteria decision making based on trust and reputation in supply chain. Int J Prod Econ. 2014;147(Part B):362–372. doi: 10.1016/j.ijpe.2013.04.014
  • Drira K, Seba H, Kheddouci H. ECGK: an efficient clustering scheme for group key management in MANETs. Comput Commun. 2010;33:1094–1107. doi: 10.1016/j.comcom.2010.02.007
  • Birtolo C, Ronca D. Advances in clustering collaborative filtering by means of fuzzy C-means and trust. Expert Syst Appl. 2013;40:6997–7009. doi: 10.1016/j.eswa.2013.06.022
  • Conceicao L, Curado M. Onto scalable wireless ad hoc networks: adaptive and location-aware clustering. Ad Hoc Netw. 2013;11:2484–2499. doi: 10.1016/j.adhoc.2013.07.001
  • Palanisamy V, Annadurai P. Trust based clustering for multicast key distribution scheme in ad hoc network. Int J Internet Protocol Technol. 2011;6:46–64. doi: 10.1504/IJIPT.2011.040614
  • Sreelaja NK, Pai GAV. Stream cipher for binary image encryption using Ant Colony Optimization based key generation. Appl Soft Comput. 2012;12:2879–2895. doi: 10.1016/j.asoc.2012.04.002
  • Lei Y, Chen G. Recommendation-based trust model in P2P network environment. In: Shi Z, Leake D, Vadera S, editors. Intelligent information processing VI. IFIP advances in information and communication technology, vol. 385. Berlin Heidelberg: Springer; 2012. p. 305–310.
  • Yan Z, Niemi V, Chen Y, Zhang P, Kantola R. Towards trustworthy mobile social networking. In: Chin A, Zhang D, editors. Mobile social networking. Computational social sciences. New York: Springer; 2014. p. 195–235.
  • Premamayudu B, Rao KV, Varma PS. A novel pairwise key establishment and management in hierarchical wireless sensor networks (HWSN) using matrix. Paper presented at: ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I; 2013 Dec 13–15; Hotel Novotel Varun Beach, Visakhapatnam. 2014. Vol. 248. p. 425–432.
  • Li X, Zhou F, Du J. LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans Inf Forensics Security. 2013;8:924–935. doi: 10.1109/TIFS.2013.2240299
  • John SP, Samuel P. A distributed hierarchical key management scheme for mobile Ad hoc networks. Paper presented at: 2010 International Conference on Information Networking and Automation (ICINA); 2010 Oct 18–19; Kunming Convention Center, Kunming, China. 2010. Vol. 1. p. 308–314.
  • Bo R, Hsiao-Hwa C, Yi Q, Kejie L, Hu RQ, Guizani S. A pyramidal security model for large-scale group-oriented computing in mobile ad hoc networks: the key management study. IEEE Trans Veh Technol. 2009;58:398–408. doi: 10.1109/TVT.2008.923666
  • Zhang C, Sun J, Zhu X, Fang Y. Privacy and security for online social networks: challenges and opportunities. IEEE Netw. 2010;24:13–18. doi: 10.1109/MNET.2010.5510913
  • Wasef A, Lu R, Lin X, Shen X. Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]. IEEE Wirel Commun. 2010;17:22–28. doi: 10.1109/MWC.2010.5601954
  • Ray B, Han R. SecureWear: a framework for securing mobile social networks. Advances in Computer Science and Information Technology. New York, Heidelberg: Springer; 2012. p. 515–524.
  • Lu R, Lin X, Liang X, Shen X. A dynamic privacy-preserving key management scheme for location-based services in VANETs. IEEE Trans Intell Transp Systs. 2012;13:127–139. doi: 10.1109/TITS.2011.2164068
  • Isdal T, Piatek M, Krishnamurthy A, Anderson T. Privacy-preserving P2P data sharing with OneSwarm. Paper presented at: SIGCOMM'10 Proceedings of the ACM SIGCOMM 2010 conference; 2010 Aug 30–Sep 03; New York, USA. 2010. Vol. 40. p. 111–122.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.