2017
DOI: 10.1002/dac.3331
|View full text |Cite
|
Sign up to set email alerts
|

A green trust‐distortion resistant trust management scheme on mobile ad hoc networks

Abstract: Trust management is an emerging security approach used to conduct nodes' relationships in mobile ad hoc networks. It relates to assigning a trust level to each network component based on its cooperative behavior with respect to system goals. Because of its infrastructure-less nature, frequent network dynamics, and severe resource constraints, it is complex to establish trust in such a network. Mainly, trust systems are vulnerable to attacks that make use of inherent properties of the trust model to alter the a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…The scheme can detect and deal with malicious attacks, and the reliability evaluation of data and mobile nodes is also implemented. Movahedi et al 29 proposed a green trust management scheme, which can deal with different trust distortion attacks in multiple attack environments. According to the security problems in different scenarios of IoT, these schemes put forward corresponding trust management schemes and achieved good results.…”
Section: Related Workmentioning
confidence: 99%
“…The scheme can detect and deal with malicious attacks, and the reliability evaluation of data and mobile nodes is also implemented. Movahedi et al 29 proposed a green trust management scheme, which can deal with different trust distortion attacks in multiple attack environments. According to the security problems in different scenarios of IoT, these schemes put forward corresponding trust management schemes and achieved good results.…”
Section: Related Workmentioning
confidence: 99%
“…It also checks the transmission failure and provides high fault tolerance. GTRTMS 84 method has the capacity of self‐adaptation and detection of trust‐distortion attacks. This method calculates the trust by overhearing the packets in the promiscuous mode.…”
Section: Classification and Reviewmentioning
confidence: 99%
“…In recent years, trust models have been the subject of study in various networking contexts other than IoT, including wireless sensor networks (WSNs), mobile ad hoc networks and peer‐to‐peer networks, just to mention a few. However, these works cannot be directly applied for the D2D context due to the resource constraints of IoT devices and their different objective matter (service offloading in D2D versus routing in most of other contexts).…”
Section: Related Workmentioning
confidence: 99%