{"id":"https://openalex.org/W2307656718","doi":"https://doi.org/10.1109/comsnets.2016.7440007","title":"Analysis of trust models in Mobile Ad Hoc Networks: A simulation based study","display_name":"Analysis of trust models in Mobile Ad Hoc Networks: A simulation based study","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2307656718","doi":"https://doi.org/10.1109/comsnets.2016.7440007","mag":"2307656718"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets.2016.7440007","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2016.7440007","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047990248","display_name":"Bata Krishna Tripathy","orcid":"https://orcid.org/0000-0001-9767-0008"},"institutions":[{"id":"https://openalex.org/I99729588","display_name":"Indian Institute of Technology Bhubaneswar","ror":"https://ror.org/04gx72j20","country_code":"IN","type":"education","lineage":["https://openalex.org/I99729588"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Bata Krishna Tripathy","raw_affiliation_strings":["Indian Institute of Technology Bhubaneswar, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Bhubaneswar, India","institution_ids":["https://openalex.org/I99729588"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071220202","display_name":"Padmalochan Bera","orcid":"https://orcid.org/0000-0002-0044-7051"},"institutions":[{"id":"https://openalex.org/I99729588","display_name":"Indian Institute of Technology Bhubaneswar","ror":"https://ror.org/04gx72j20","country_code":"IN","type":"education","lineage":["https://openalex.org/I99729588"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Padmalochan Bera","raw_affiliation_strings":["Indian Institute of Technology Bhubaneswar, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Bhubaneswar, India","institution_ids":["https://openalex.org/I99729588"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100648380","display_name":"Mohammad Ashiqur Rahman","orcid":"https://orcid.org/0000-0002-2963-7430"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Ashiqur Rahman","raw_affiliation_strings":["Tennessee Tech University, USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech University, USA","institution_ids":["https://openalex.org/I63920570"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047990248"],"corresponding_institution_ids":["https://openalex.org/I99729588"],"apc_list":null,"apc_paid":null,"fwci":0.5791,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.69841099,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2845","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.8549994826316833},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7960847616195679},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6416105031967163},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5873748660087585},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5857011079788208},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5676974058151245},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5494701862335205},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46372100710868835},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.44509634375572205},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.4240017831325531},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.41979777812957764},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3576946258544922},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15311643481254578},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.11192160844802856},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.0868883728981018}],"concepts":[{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.8549994826316833},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7960847616195679},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6416105031967163},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5873748660087585},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5857011079788208},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5676974058151245},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5494701862335205},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46372100710868835},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.44509634375572205},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.4240017831325531},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.41979777812957764},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3576946258544922},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15311643481254578},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.11192160844802856},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.0868883728981018},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets.2016.7440007","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2016.7440007","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W131464887","https://openalex.org/W597273825","https://openalex.org/W1550543595","https://openalex.org/W1575210522","https://openalex.org/W1976786539","https://openalex.org/W1977328148","https://openalex.org/W2047346596","https://openalex.org/W2057521704","https://openalex.org/W2062802747","https://openalex.org/W2075398911","https://openalex.org/W2096029285","https://openalex.org/W2100975384","https://openalex.org/W2102479365","https://openalex.org/W2120870867","https://openalex.org/W2122516858","https://openalex.org/W2134618496","https://openalex.org/W2142175015","https://openalex.org/W2158137731","https://openalex.org/W2158210197","https://openalex.org/W2161166082","https://openalex.org/W2161562909","https://openalex.org/W2165569678","https://openalex.org/W2167413966","https://openalex.org/W2168844280","https://openalex.org/W6605380989","https://openalex.org/W6674883405"],"related_works":["https://openalex.org/W2027636740","https://openalex.org/W3035283282","https://openalex.org/W2062688728","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W2061231656","https://openalex.org/W2916013893","https://openalex.org/W2551975114","https://openalex.org/W1123412569","https://openalex.org/W2771454953"],"abstract_inverted_index":{"The":[0,29,45],"Mobile":[1],"Ad":[2],"Hoc":[3],"Network":[4],"(MANET)":[5],"has":[6],"become":[7],"a":[8,91,126],"key":[9],"communication":[10,35],"technology":[11],"in":[12,43,79,98],"various":[13,40,58,95],"domains":[14],"such":[15],"as,":[16],"military":[17],"defense":[18],"networks,":[19,27],"disastrous":[20],"and":[21,32,83,108,143],"rescue":[22],"operational":[23],"command":[24],"centers,":[25],"vehicular":[26],"etc.":[28],"dynamic":[30],"topology":[31],"open":[33],"wireless":[34],"medium":[36],"may":[37],"potentially":[38],"introduce":[39],"security":[41,53,105],"threats":[42],"MANET.":[44],"recent":[46],"research":[47],"on":[48,51,57,74],"MANET":[49,99],"focuses":[50],"developing":[52],"enforcement":[54],"mechanisms":[55],"based":[56],"trust":[59,66,96,118,132],"models.":[60,119],"However,":[61],"most":[62],"of":[63,94,116],"the":[64,114],"existing":[65,117],"models":[67,97,133],"are":[68],"application":[69],"specific":[70],"which":[71],"impose":[72],"limitations":[73,115],"their":[75,103,124],"applicability":[76],"with":[77,100,140],"changes":[78],"requirements,":[80],"resource":[81],"constraints,":[82],"behavioural":[84],"dynamics.":[85],"In":[86],"this":[87],"paper,":[88],"we":[89],"present":[90],"comparative":[92],"study":[93,111],"respect":[101],"to":[102],"performance,":[104],"enforcing":[106],"features,":[107],"usability.":[109],"This":[110],"experimentally":[112],"reveals":[113],"It":[120],"also":[121],"shows":[122],"that":[123,136],"is":[125],"need":[127],"for":[128,134],"designing":[129],"adaptive,":[130],"multi-level":[131],"MANET,":[135],"supports":[137],"heterogeneous":[138],"applications":[139],"different":[141],"requirements":[142],"contexts.":[144]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
