2018
DOI: 10.1080/01969722.2018.1541598
|View full text |Cite
|
Sign up to set email alerts
|

Dealing with Collusion Attack in a Trust-Based MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…iii) Trust-based Scheme: The trust-based approach is a frequently used approach for resisting collusion in MANET. The technique used in [39] emphasizes validating the neighboring mobile nodes' recommended trust. Another unique trust-based model has been presented in [40], where a clustering mechanism is applied along with extensive rule constructs in fuzzy logic.…”
Section: A Frequently Adopted Approachesmentioning
confidence: 99%
“…iii) Trust-based Scheme: The trust-based approach is a frequently used approach for resisting collusion in MANET. The technique used in [39] emphasizes validating the neighboring mobile nodes' recommended trust. Another unique trust-based model has been presented in [40], where a clustering mechanism is applied along with extensive rule constructs in fuzzy logic.…”
Section: A Frequently Adopted Approachesmentioning
confidence: 99%
“…Some of them [16,17] were proposed to deal with a specific type of message while others [3,6,19] used decentralized trust systems, relying on interactions with neighbors, which is not practical in the highly dynamic environment of a VANET. Several works [4,10,15,23] tried to cope with a specific type of attack, which can be a limitation whereas several others were designed to handle a specific challenge such as authentication [24], privacy [20,25] or localization [18,22]. Therefore, unlike other solutions, we propose an adaptive trust-based security scheme for message exchange in VANETs based on VGA, our new clustering algorithm designed to handle the dynamicity such networks.…”
Section: Related Workmentioning
confidence: 99%
“…Trust can be used to promote healthy collaboration by enabling collaborating vehicles to counter uncertainty and suspicion by establishing trustworthy relationships [2,3]. Because of the importance of the challenge, trust is associated with an abstract system that helps decision making, referred to as Trust Management (TM) [4]. Hence our main proposal is a trust-based security scheme for message exchanges in VANETs.…”
mentioning
confidence: 99%
“…Trust management mechanism can get confused by collusion of malicious nodes. Some nodes can collude in order to mutually increase their trustworthiness and at the same time decrease the trustworthiness of other (innocent) nodes [13].…”
Section: Collusion Attackmentioning
confidence: 99%
“…This allows collecting relevant information by the trust-based architecture independently of the specific features of the considered routing protocol. [13] pays attention to the problem of collusion attacks in trust-based MANET networks (mobile ad hoc networks). Trust management may be faked by cheaters: several nodes collude in order to rate each other with the maximum value and at the same time decrease other nodes' reputation by giving negative recommendations about the latter.…”
Section: Introductionmentioning
confidence: 99%