Ad Hoc Networks 2017
DOI: 10.5772/66519
|View full text |Cite
|
Sign up to set email alerts
|

A Composite Trust Model for Secure Routing in Mobile Ad-Hoc Networks

Abstract: It is imperative to address the issue of secure routing in mobile ad-hoc networks (MANETs) where the nodes seek for cooperative and trusted behaviour from the peer nodes in the absence of well-established infrastructure and centralized authority. Due to the inherent absence of security considerations in the traditional ad-hoc routing protocols, providing security and reliability in the routing of data packets is a major challenge. This work addresses this issue by proposing a composite trust metric based on th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…In IDS, several approaches are proposed such as packet payload analysis [23], pattern propagation [24] and bro language [25]. In addition, various schemes for ad-hoc networks are proposed to detect attack patterns and to provide a defense mechanism in the network [26][27][28][29][30]. IDS which are passive by nature have a key issue their inability to mount targeted, reliable and adaptive response [31].…”
Section: Intrusion Detection and Preventionmentioning
confidence: 99%
“…In IDS, several approaches are proposed such as packet payload analysis [23], pattern propagation [24] and bro language [25]. In addition, various schemes for ad-hoc networks are proposed to detect attack patterns and to provide a defense mechanism in the network [26][27][28][29][30]. IDS which are passive by nature have a key issue their inability to mount targeted, reliable and adaptive response [31].…”
Section: Intrusion Detection and Preventionmentioning
confidence: 99%
“…Jhaveri et al proposed a composite trust model which utilized both social and QoS trust components [11] to estimate the trust degree of nodes in which the ditch ratio was used as a social trust component. This ditch ratio parameter is valuable for knowing the behavior of nodes and to identify malicious nodes.…”
Section: Related Workmentioning
confidence: 99%
“…There have already been some proposals for securing the process of routing in MANETs. Although cryptographic techniques have been widely used in routing to protect routing information from being tinkered by the adversary, such an approach may not be practical for real MANETs due to heavy computational overhead and lack of capability of spotting attacking nodes given the high mobility of MANETs where nodes continuously join and leave the networks [11]. Introducing "trust" into such a hostile environment can help nodes observe and predict the behavior of neighboring nodes in an efficient manner.…”
Section: Introductionmentioning
confidence: 99%
“…Inspired by these works, a lot of researchers have devoted their efforts to exploring the security issues in large-scale wireless networks. For instance, the secure routing protocols were investigated in [14][15][16], the design of effective physical layer authentication schemes was analysed in [17][18][19], the security performances in terms of secrecy throughput capacity and eavesdropper-tolerance capability were explored in [20][21][22].…”
Section: Introductionmentioning
confidence: 99%