2018
DOI: 10.1109/jsyst.2017.2720757
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 31 publications
(11 citation statements)
references
References 31 publications
0
11
0
Order By: Relevance
“…With the passage of time more and more nodes come in contact with each other and develop trust among themselves. The number of nodes having the least level of trust (ie, 1) increase faster than the nodes with higher trust levels (ie, 2,3,4). This is cogent with the fact that only a few nodes in the network have higher levels of trust.…”
Section: Simulation Analysismentioning
confidence: 95%
See 3 more Smart Citations
“…With the passage of time more and more nodes come in contact with each other and develop trust among themselves. The number of nodes having the least level of trust (ie, 1) increase faster than the nodes with higher trust levels (ie, 2,3,4). This is cogent with the fact that only a few nodes in the network have higher levels of trust.…”
Section: Simulation Analysismentioning
confidence: 95%
“…Several secured routing protocols for Oppnets have been proposed in the literature. Representative ones are listed in the reference list (see previous studies [11][12][13][14][15][16][17] ). The tabular representation of secure routing protocols of opportunistic networks are represented in Table 1.…”
Section: Secure Routing Protocols Of Opportunistic Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…While the solutions above maybe considerable in dense node scenarios, they can't be applied in sparse scenarios such as vast seas and oceans, where connectivity is more opportunistic. Security proposals for opportunistic and delay tolerant networks such as the Cryptography-Based Misbehavior Detection and Trust Control Mechanism [17] use infrastructure nodes for monitoring participative nodes in the network. The infrastructure nodes look for suspicious misbehaving nodes that may perform attacks.…”
Section: Background and Related Workmentioning
confidence: 99%