2008 Third International Conference on Communications and Networking in China 2008
DOI: 10.1109/chinacom.2008.4685154
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Trust-based Location-Aided Routing for Ad Hoc networks

Abstract: The characteristics of mobile Ad Hoc network make it face much more security threats than wired network, while the security of routing is the premise of secure application of Ad Hoc networks. In allusion to the safety weakness of resisting the active attacks from malicious nodes, trust metric is introduced to defend those attacks by loading a trust model on proposed Distance-Based LAR (DBALR). The improved Secure Trust-based LocationAided Routing (ST-LAR) algorithm utilizes direct trust and recommendation trus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…We can classify all the works that try to mitigate and stimulate the misbehaved or uncooperative node into four categories: “credit-based systems” (Anderegg and Eidenbenz, 2003; Buttyan and Hubaux, 2001; Jiang et al , 2015; Yang et al , 2002; Zhong et al , 2003), “acknowledgement-based systems” (Liu et al , 2007; Padmanabhan and Simon, 2003; Xue and Nahrstedt, 2004), “trust management and reputation-based systems” (Buchegger and Le Boudec, 2002; He et al , 2004; Marti et al , 2000; Michiardi and Molva, 2002; Sen, 2010; Velloso et al , 2010) and “trust-based routing protocols” (De Rango and Marano, 2009; Ghosh et al , 2005; Lupia and De Rango, 2014; Mohanapriya and Krishnamurthi, 2014; Serique and De Sousa, 2012; Wang and Wu, 2011; Xia, Jia, Ju, Li and Sha, 2013; Xia et al , 2015). Some of the related previous works that have been carried out in order to make ad hoc networks more trustworthy are explained in this section.…”
Section: Related Workmentioning
confidence: 99%
“…We can classify all the works that try to mitigate and stimulate the misbehaved or uncooperative node into four categories: “credit-based systems” (Anderegg and Eidenbenz, 2003; Buttyan and Hubaux, 2001; Jiang et al , 2015; Yang et al , 2002; Zhong et al , 2003), “acknowledgement-based systems” (Liu et al , 2007; Padmanabhan and Simon, 2003; Xue and Nahrstedt, 2004), “trust management and reputation-based systems” (Buchegger and Le Boudec, 2002; He et al , 2004; Marti et al , 2000; Michiardi and Molva, 2002; Sen, 2010; Velloso et al , 2010) and “trust-based routing protocols” (De Rango and Marano, 2009; Ghosh et al , 2005; Lupia and De Rango, 2014; Mohanapriya and Krishnamurthi, 2014; Serique and De Sousa, 2012; Wang and Wu, 2011; Xia, Jia, Ju, Li and Sha, 2013; Xia et al , 2015). Some of the related previous works that have been carried out in order to make ad hoc networks more trustworthy are explained in this section.…”
Section: Related Workmentioning
confidence: 99%
“…Various kind of attacks such as collusion attack, free riding, selective attack, routing disruption attack, resource consumption attack are mentioned in [1], [2] and [3] previously. These behaviors not only confuse the trust evaluation among nodes, but also occu ply the resources which are limited and precious in Ad Hoc networks.Until now, many trust models have been proposed against threats.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we adopt the revised D-S combination rule which includes a consistent intensity to calculate nodes' trust value. [15] introduced the trust metric which depended on network traffic statistics to evaluate the trust and then loaded the trust model on the previously proposed distance-based locationaided routing (LAR). The algorithm utilized direct trust and recommendation trust to prevent malicious nodes from joining the forwarding.…”
Section: Trust Evaluationmentioning
confidence: 99%