Projects funded by the NCN


Information on the principal investigator and host institution

Information of the project and the call

Keywords

Equipment

Delete all

Reputation and trust building in computer communication systems under virtual anonymity and blind service provider selection

2016/21/B/ST6/03146

Keywords:

computer communication systems multiagent systems virtual anonymity reputation trust dynamics cooperation enforcement Markovian analysis game theory

Descriptors:

  • ST6_7: Artificial intelligence, intelligent systems, multi-agent systems
  • ST6_6: Algorithms, parallel, distributed and network algorithms, algorithmic game theory
  • ST6_2: Computer systems, parallel/distributed systems, sensor networks, embedded systems, cyber-physical systems

Panel:

ST6 - Computer science and informatics: informatics and information systems, computer science, scientific computing, intelligent systems

Host institution :

Politechnika Gdańska, Wydział Elektroniki, Telekomunikacji i Informatyki

woj. pomorskie

Other projects carried out by the institution 

Principal investigator (from the host institution):

dr hab. Jerzy Konorski 

Number of co-investigators in the project: 4

Call: OPUS 11 - announced on 2016-03-15

Amount awarded: 306 700 PLN

Project start date (Y-m-d): 2017-07-26

Project end date (Y-m-d): 2021-07-25

Project duration:: 48 months (the same as in the proposal)

Project status: Project settled

Project description

Download the project description in a pdf file

Note - project descriptions were prepared by the authors of the applications themselves and placed in the system in an unchanged form.

Equipment purchased [PL]

  1. Laptop średniej klasy z monitorem 15" (3 500 PLN)
  2. Laptop z szybkim procesorem obliczeniowym i graficznym (5 500 PLN)

Information in the final report

  • Publication in academic press/journals (6)
  • Articles in post-conference publications (12)
  1. Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
    Authors:
    Jerzy Konorski, Jakub Grochowski
    Academic press:
    Wireless Communications and Mobile Computing (rok: 2018, tom: 2018, strony: 45307), Wydawca: Wiley - Hindawi
    Status:
    Published
    DOI:
    10.1155/2018/8612817 - link to the publication
  2. Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation
    Authors:
    Jerzy Konorski
    Academic press:
    Information Sciences (rok: 2022, tom: 607, strony: 831-848), Wydawca: Elsevier
    Status:
    Published
    DOI:
    10.1016/j.ins.2022.06.024 - link to the publication
  3. Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
    Authors:
    Jerzy Konorski, Szymon Szott
    Academic press:
    IEEE Internet of Things Journal (rok: 2022, tom: b.d., strony: b.d.), Wydawca: IEEE
    Status:
    Published
    DOI:
    10.1109/JIOT.2022.3143713 - link to the publication
  4. Compression of Dynamic Graphs Generated by a Duplication Model
    Authors:
    Krzysztof Turowski, Abram Magner, Wojciech Szpankowski
    Academic press:
    Algorithmica (rok: 2020, tom: 82, strony: 2687 - 2702), Wydawca: Springer
    Status:
    Published
    DOI:
    10.1007/s00453-020-00699-2 - link to the publication
  5. A reactive algorithm for deducing nodal forwarding behavior in a multihop ad hoc wireless network in the presence of errors
    Authors:
    Karol Rydzewski, Jerzy Konorski
    Academic press:
    International Journal of Electronics and Telecommunications (rok: 2020, tom: 66, strony: 193-199), Wydawca: PAN
    Status:
    Published
    DOI:
    10.24425/ijet.2020.131863 - link to the publication
  6. Temporal Ordered Clustering in Dynamic Networks: Unsupervised and Semi-supervised Learning Algorithms
    Authors:
    Krzysztof Turowski, Jithin K. Sreedharan, Wojciech Szpankowski
    Academic press:
    IEEE Transactions on Network Science and Engineering (rok: 2021, tom: 8, strony: 1426 - 1442), Wydawca: IEEE
    Status:
    Published
    DOI:
    10.1109/TNSE.2021.3058376 - link to the publication
  1. Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS
    Authors:
    Jerzy Konorski
    Conference:
    Krajowe Sympozjum Telekomunikacji i Teleinformatyki (rok: 2017, ), Wydawca: SIGMA-NOT
    Data:
    konferencja 2017-09-13-15
    Status:
    Published
  2. A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks
    Authors:
    Jerzy Konorski, Szymon Szott
    Conference:
    IEEE Global Communications Conference (rok: 2018, ), Wydawca: IEEE
    Data:
    konferencja 9-13.12
    Status:
    Published
  3. Asymptotics of Entropy of the Dirichlet-Multinomial Distribution
    Authors:
    Krzysztof Turowski, Philippe Jacquet, Wojciech Szpankowski
    Conference:
    2019 IEEE International Symposium on Information Theory (ISIT 2019) (rok: 2019, ), Wydawca: IEEE
    Data:
    konferencja 2019-07-07 2019-07-12
    Status:
    Published
  4. Compression of Dynamic Graphs Generated by a Duplication Model
    Authors:
    Krzysztof Turowski, Abram Magner, Wojciech Szpankowskii
    Conference:
    56th Annual Allerton Conference on Communication, Control, and Computing (rok: 2018, ), Wydawca: IEEE
    Data:
    konferencja 2-5.10
    Status:
    Published
  5. Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
    Authors:
    Jerzy Konorski, Karol Rydzewski
    Conference:
    11th EAI International Conference ADHOCNETS 2019 (rok: 2019, ), Wydawca: Springer LNIST vol. 306
    Data:
    konferencja 2019-11-17 2019-11-21
    Status:
    Published
  6. Obrona sieci informacjocentrycznej przed zatruwaniem treści przez niezaufanych wydawców z użyciem modelu infekcji w grafach
    Authors:
    Jerzy Konorski, Jakub Grochowski
    Conference:
    Krajowe Sympozjum Telekomunikacji i Teleinformatyki (rok: 2019, ), Wydawca: SIGMA-NOT
    Data:
    konferencja 2019-06-26-28
    Status:
    Published
  7. Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
    Authors:
    Jerzy Konorski
    Conference:
    27th Int'l Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom) (rok: 2018, ), Wydawca: IEEE
    Data:
    konferencja 1-3.8
    Status:
    Published
  8. Carrot and Stick: Incentivizing Cooperation Between Nodes in Multihop Wireless Ad Hoc Networks
    Authors:
    Karol Rydzewski
    Conference:
    12th EAI International Conference ADHOCNETS 2020 (rok: 2021, ), Wydawca: Springer International Publishing
    Data:
    konferencja 44152
    Status:
    Published
  9. Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
    Authors:
    Jerzy Konorski
    Conference:
    27th International Telecommunication Networks and Applications Conference (rok: 2017, ), Wydawca: IEEE
    Data:
    konferencja 22-24.11
    Status:
    Published
  10. Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
    Authors:
    Jerzy Konorski
    Conference:
    29th International Telecommunication Networks and Applications Conferenc (rok: 2019, ), Wydawca: IEEE
    Data:
    konferencja 2019-11-27 2019-11-29
    Status:
    Published
  11. Dedukcja zachowań węzłów tranzytowych w wieloskokowej sieci bezprzewodowej w obecności zakłóceń
    Authors:
    Jerzy Konorski, Karol Rydzewski
    Conference:
    Krajowe Sympozjum Telekomunikacji i Teleinformatyki (rok: 2019, ), Wydawca: SIGMA-NOT
    Data:
    konferencja 2019-06-26-28
    Status:
    Published
  12. Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
    Authors:
    Stanisław Barański, Jerzy Konorski
    Conference:
    28th International Telecommunication Networks and Applications Conference (rok: 2020, ), Wydawca: IEEE
    Data:
    konferencja 2020-11-25 2020-11-27
    Status:
    Published