2013
DOI: 10.1155/2013/652051
|View full text |Cite
|
Sign up to set email alerts
|

A Credible Routing Based on a Novel Trust Mechanism in Ad Hoc Networks

Abstract: Many existing routing protocols in Mobile Ad hoc Networks (MANETs) focus on finding paths in dynamic networks without considering security. In this paper, we propose a trust model which evaluates neighbours' direct trust by factors of encounter time, mobility, and successful cooperation frequency. The revised D-S evidence theory is used to combine multiple recommended pieces of evidence and obtain the recommended trust value. Then based on the novel trust mechanism, we propose a trusted routing protocol named … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 22 publications
(38 reference statements)
0
13
0
Order By: Relevance
“…Similarly, the trust recommendation computing method for a multiple‐level trust management framework for WSN also decays recommendations according to path length. In , a recommendation is discounted on the basis of the trust values of intermediate nodes along a path. Likewise, the scheme of and decays recommendations according to the trust degrees of intermediates.…”
Section: Definitions and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Similarly, the trust recommendation computing method for a multiple‐level trust management framework for WSN also decays recommendations according to path length. In , a recommendation is discounted on the basis of the trust values of intermediate nodes along a path. Likewise, the scheme of and decays recommendations according to the trust degrees of intermediates.…”
Section: Definitions and Related Workmentioning
confidence: 99%
“…The propagation of trust recommendations in various network types shares a set of common features, and thus it can be abstracted as a general overlay network model. After analyzing a number of trust schemes in the context of MANET, P2P, WSN and cloud computing, we summarize the common features as follows: there is only one requesting entity (trustor) and one target node (trustee) for a set of recommendations; the number of recommenders is not limited ; in general, recommenders are neighbors of the target, and recommendations are the direct trust values of the target evaluated by recommenders ; recommenders are categorized into one‐hop and multi‐hop away from the trustor ; a one‐hop recommendation is directly delivered to the trustor, while a multi‐hop recommendation is transmitted through a path consisting of a certain number of intermediate entities . …”
Section: Establishing Recommendation Propagation Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…To improve the security of routing in wireless ad hoc networks, researchers have proposed many relevant algorithms, such as the data encryption algorithm [15,16], the trustbased security routing algorithm [17][18][19][20], and the game theory-based security transmission algorithm [21][22][23]. The large amount of computation makes it challenging to apply the traditional encryption algorithm directly to the energyconstrained wireless ad hoc networks.…”
Section: Introductionmentioning
confidence: 99%
“…The malicious mobile nodes often misroute the data packets so that the high nodes having high mobility may damage and interrupt the data transmission. To protect the ad hoc network from the external and internal attacks is the basic need to be addressed properly [3] [22]. As the ad hoc networks are deployed easily, they are widely used in various applications, such as disaster relief operations, and military [1] [23].…”
Section: Introductionmentioning
confidence: 99%