Provided by: International Journal of Engineering Trends and Technology
Date Added: Oct 2013
In this paper the authors proposed an efficient trust computation method for identifying and allowing the nodes based on trust measures. Most of their approaches works on statistical measures like trust computations (i.e. direct and indirect trust computations) these approaches are not optimal, because anonymous user may not have (or use) same set of characteristics as previous connection. In this paper they are proposing an efficient trust computation method apart from the traditional trust computation method, this approach based on classification for analyzing the nodes or user when connects to the network.