{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:15:28Z","timestamp":1758845728134,"version":"3.37.3"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T00:00:00Z","timestamp":1372636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-0709329","CNS-0923238","OCI-0904938","CCF-0953371","CCF-1128805"],"award-info":[{"award-number":["CNS-0709329","CNS-0923238","OCI-0904938","CCF-0953371","CCF-1128805"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"abstract":"<jats:p>Mobility model and network topology play important roles in mobile ad hoc networks (MANETs). Most existing trust and reputation management systems in a MANET do not address mobility issues adequately. In this paper, we study the trust management problem in a MANET with cyclic movement patterns. In a cyclic MANET (cMANET) where nodes periodically move, we formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggregation issues. Unlike trust management in conventional schemes, trust management in cMANET involves not only neighbor trust relationships but location and time factors as well. We model trust relations as a trust graph in cMANET to enhance accuracy and efficiency of trust establishment among nodes. Leveraging the distributed Bellman-Ford algorithm and stochastic Markov chain process for fast and lightweight aggregation of trust scores, the cTrust scheme is a decentralized and self-configurable trust aggregation scheme. To evaluate the performance, we implement the proposed cTrust scheme. We use the student contact patterns on the National University of Singapore (NUS) campus and Seattle metro bus traces as case studies for our cMANET communication model. The simulation results demonstrate the features of trust relationship dissemination in real environments and the efficiency, accuracy, scalability, and robustness of the cTrust scheme. With increasing scales of ad hoc networks and complexities of trust topologies, cTrust scales well with marginal overheads.<\/jats:p>","DOI":"10.1109\/tvt.2012.2230411","type":"journal-article","created":{"date-parts":[[2012,11,28]],"date-time":"2012-11-28T14:03:18Z","timestamp":1354111398000},"page":"2792-2806","source":"Crossref","is-referenced-by-count":25,"title":["cTrust: Trust Management in Cyclic Mobile Ad Hoc Networks"],"prefix":"10.1109","volume":"62","author":[{"given":"Huanyu","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Xin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaolin","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15291-7_43"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-011-0576-6"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461948"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2034669"},{"key":"ref31","first-page":"1","article-title":"Experience with an object reputation system for peer-to-peer filesharing","author":"walsh","year":"2006","journal-title":"Proc 3rd Conf Symp NSDI"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861390"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235290"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-009-9275-7"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73655-6_1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208963"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1021"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1109\/TVT.2009.2030892","article-title":"FleaNet: A virtual market place on vehicular networks","volume":"59","author":"lee","year":"2010","journal-title":"IEEE Trans Veh Technol"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935316"},{"key":"ref13","first-page":"201b","article-title":"PET: A personalized trust model with reputation and risk evaluation for P2P resource sharing","author":"liang","year":"2005","journal-title":"Proc 38th Annu HICSS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.04.001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374665"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.011"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934998"},{"key":"ref19","first-page":"1","article-title":"One hop reputations for peer to peer file sharing workloads","author":"piatek","year":"2008","journal-title":"Proc 5th USENIX Symp NSDI"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.154"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.2002581"},{"journal-title":"CRAWDAD Data Set Nus\/contact (V 2006-08-01)","year":"2006","author":"srinivasan","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1470831"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/T-VT.1987.24106"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","article-title":"Information theoretic framework of trust modeling and evaluation for ad hoc networks","volume":"24","author":"sun","year":"2006","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1362542.1362546"},{"journal-title":"CRAWDAD data set rice\/ad_hoc_city","year":"2003","author":"jetcheva","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939008"},{"journal-title":"A Robust Reputation System for Mobile Ad-hoc Networks","year":"2003","author":"buchegger","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref1","first-page":"85","article-title":"A performance comparison of multi-hop wireless ad hoc network routing protocols","author":"broch","year":"1998","journal-title":"Proc 4th Annu ACM\/IEEE Int Conf MobiCom"},{"key":"ref20","first-page":"14","article-title":"Bazaar: Strengthening user reputations in online marketplaces","author":"post","year":"2011","journal-title":"Proc 6th USENIX Symp NSDI"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.123"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2001.937360"},{"key":"ref24","first-page":"2300","article-title":"Socialfilter: Introducing social trust to collaborative spam mitigation","author":"sirivianos","year":"2011","journal-title":"Proc 30th IEEE INFOCOM"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.48"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.258"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/1161089.1161100","article-title":"Analysis and implications of student contact patterns derived from campus schedules","author":"srinivasan","year":"2006","journal-title":"Proc 12th Annu Int Conf MobiCom"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.136"}],"container-title":["Vehicular Technology, IEEE Transactions on"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel5\/25\/6557008\/06363621.pdf?arnumber=6363621","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/25\/6557008\/06363621.pdf?arnumber=6363621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T15:55:35Z","timestamp":1638201335000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6363621\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":41,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.1109\/tvt.2012.2230411","relation":{},"ISSN":["0018-9545"],"issn-type":[{"type":"print","value":"0018-9545"}],"subject":[],"published":{"date-parts":[[2013,7]]}}}