2022
DOI: 10.3390/s22020571
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks

Abstract: The distributed nature of mobile ad hoc networks (MANETs) presents security challenges and vulnerabilities which sometimes lead to several forms of attacks. To improve the security in MANETs, reputation and trust management systems (RTMS) have been developed to mitigate some attacks and threats arising from abnormal behaviours of nodes in networks. Generally, most reputation and trust systems in MANETs focus mainly on penalising uncooperative network nodes. It is a known fact that nodes in MANETs have limited … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 31 publications
0
10
0
Order By: Relevance
“…Their components include sensing, data collection, heterogeneous connectivity, data processing, etc. [ 3 , 4 , 5 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Their components include sensing, data collection, heterogeneous connectivity, data processing, etc. [ 3 , 4 , 5 ].…”
Section: Introductionmentioning
confidence: 99%
“…The method is based on Node-Disjoint Multipath Routing [ 5 ], which allows to exchange and manage data between smart things, ensuring privacy by the threshold SSSs and Redundant Residue Number System (RRNS). We describe details of the generation of parameters that overcome the limitations of the well-known Mignotte scheme, data partitioning, and data recovery and provide a theoretical analysis of reliability and security bounds.…”
Section: Introductionmentioning
confidence: 99%
“…Both the attacked entity and the entity with which it interacts are at risk of being attacked, and there are different types of entities interacting, such as user-terminal interactions. Most of the current trust evaluation models are for sibling node for trust evaluation [6][7]. In addition, the parameters, such as the time window in continuous trust evaluation, are set manually and lack adaptivity [2][3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…Most of the current trust evaluation models are for sibling node for trust evaluation [6][7]. In addition, the parameters, such as the time window in continuous trust evaluation, are set manually and lack adaptivity [2][3][4][5][6][7]. At present, research on trust evaluation models mainly can be mainly divided into two categories based on multi-attribute evaluation models [8][9][10] and machine learning models [11], both of which attach importance to the mining of multidimensional historical behavioral evidence information of network entities and the continuity and adaptiveness of the trust evaluation process.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation