2012
DOI: 10.21236/ada583262
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing

Abstract: The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Delay tolerant networks (DTNs) are characterized by high end-to-end latency, frequent disconnection, and opportunistic communication over unreliable wireless links. In this paper, we design and validate a dynamic trust manag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
7
3

Relationship

2
8

Authors

Journals

citations
Cited by 21 publications
(32 citation statements)
references
References 19 publications
(39 reference statements)
0
32
0
Order By: Relevance
“…We also plan to further refine the inside attacker behavior model [2], [48] and extend the analysis to homogeneous or heterogeneous clustered WSNs [21], [26] without a BS. Finally, we also plan to investigate the use of trust/reputation management [13], [27], [47] to strengthen intrusion detection through "weighted voting," lever-aging the knowledge of trust/reputation of neighbor nodes, as well as to tackle the "what paths to use" problem in multipath routing for intrusion tolerance in WSNs. …”
Section: Resultsmentioning
confidence: 99%
“…We also plan to further refine the inside attacker behavior model [2], [48] and extend the analysis to homogeneous or heterogeneous clustered WSNs [21], [26] without a BS. Finally, we also plan to investigate the use of trust/reputation management [13], [27], [47] to strengthen intrusion detection through "weighted voting," lever-aging the knowledge of trust/reputation of neighbor nodes, as well as to tackle the "what paths to use" problem in multipath routing for intrusion tolerance in WSNs. …”
Section: Resultsmentioning
confidence: 99%
“…The trust management is a key factor in Delay Tolerant Networks (DTNs) and Social Networks too. In [10] the authors adopted a dynamic approach to manage the trust formation and aggregation in response to the changing conditions of the network. For inferring trust in mobile social networks, a fuzzy trust inference mechanism is presented in [11].…”
Section: A Trust Managementmentioning
confidence: 99%
“…Chen et al [4] proposed a trust management protocol in Delay tolerant networks to detect attackers. The author combines QOS trust with social trust to obtain a composite trust metric.…”
Section: Related Workmentioning
confidence: 99%