2019
DOI: 10.3390/s19061467
|View full text |Cite
|
Sign up to set email alerts
|

A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things

Abstract: The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 69 publications
(42 citation statements)
references
References 28 publications
0
41
0
Order By: Relevance
“…Authors in [2] proposed ARAN protocol to prevent a number of attacks such as modification, impersonation and fabrication exploits. In [21], authors proposed a quantitative trust model for Ad-Hoc networks those are integrated with Internet of Things (IoT). The proposed model combines both direct and indirect trust to calculate a node's final trust value.…”
Section: Recent Work In Ad-hoc Network Securitymentioning
confidence: 99%
“…Authors in [2] proposed ARAN protocol to prevent a number of attacks such as modification, impersonation and fabrication exploits. In [21], authors proposed a quantitative trust model for Ad-Hoc networks those are integrated with Internet of Things (IoT). The proposed model combines both direct and indirect trust to calculate a node's final trust value.…”
Section: Recent Work In Ad-hoc Network Securitymentioning
confidence: 99%
“…Methods for trust evaluation are usually classified into two categories: Direct and indirect. Direct trust evaluation assesses the past behaviors of participants, whereas indirect trust evaluation assesses the past behaviors of peers in the neighborhood [23,24].…”
Section: Intrusion Detection Intrusion Detection Is Used To Detect Amentioning
confidence: 99%
“…The Internet of things (IoT) is a part of the future Internet paradigm, which enables every physical object to be connected to the Internet by means of sensors or chips without human intervention [1]- [3]. It may comprise different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), and RFID [4], [5]. As an important part, MANET in the IoT becomes more attractive because MANET is a self-organizing and multi-hop network structure, in which nodes share a common wireless channel and can move freely without the aid of a fixed networking infrastructure [6].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the interaction between MANET and IoT creates such a new MANET-IoT network [8] that it gives greater mobility to end users and reduces the deployment costs of the network. However, at the same time, due to its lack of centralized management [9], weak connectivity [4], and resource constraints [10], MANET-IoT is more prone to attacks than infrastructure-based IoT networks. Especially, the intentional attacks to critical nodes may significantly degrade the network's function, such as disconnecting the network into multiple separate components, causing cascading failure or even the entire collapse of the network [11], [12], which results in new challenging issues for MANET-IoT networks.…”
Section: Introductionmentioning
confidence: 99%