2016
DOI: 10.1109/tits.2015.2494017
|View full text |Cite
|
Sign up to set email alerts
|

ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
193
0
6

Year Published

2016
2016
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 420 publications
(199 citation statements)
references
References 36 publications
0
193
0
6
Order By: Relevance
“…The regular hexagonal partitions have proven its flexibility to form non-overlapping clusters in large ad hoc networks [51]. In order to secure network functionalities, trust management has been widely applied in ad hoc networks [52][53][54][55][56][57]. These methodologies prevent various attacks that might affect the system passively or actively.…”
Section: Trust For Manet Scalabilitymentioning
confidence: 99%
“…The regular hexagonal partitions have proven its flexibility to form non-overlapping clusters in large ad hoc networks [51]. In order to secure network functionalities, trust management has been widely applied in ad hoc networks [52][53][54][55][56][57]. These methodologies prevent various attacks that might affect the system passively or actively.…”
Section: Trust For Manet Scalabilitymentioning
confidence: 99%
“…The strategy applies the reporting history and the policy rules for data collection to ensure the trustworthiness of the data and the IoT devices. Li and Song [15] propose a trust scheme for the vehicular ad hoc networks (VANETs) to protect collected data and the node in the VANETs. The proposed model can appraise the trustworthiness of the data and the nodes, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…The extraction and verification process are described as follows: , = rand( , , ); (4) for = 1 to do (5) i n d e xfl ; (6) fl Packet index ; (7) for = 1 to do (8) i n d e xfl ; (9) P a c k e t = Packet index ; (10) for = 1 to do (11) Da tafl Data ‖ Packet ⋅ data ; (12) Data fl Data ‖ ; (13) Data fl Data ‖ ; (14) 0 fl Hash(Data); (15) fl MSB( 0 , ); (16) if == then (17) Return (Integrity intact); (18) else (19) Return (Integrity tampered); …”
Section: Watermark Extraction Algorithmmentioning
confidence: 99%
“…In [18], an attack-resistant trust management scheme (named ART) was proposed for VANETs. The authors claimed that their ART can detect and resist malicious attacks such as simple attack, bad-mouth attack, and zigzag attack.…”
Section: Trust Management In Vanetsmentioning
confidence: 99%