2012
DOI: 10.1049/iet-ifs.2010.0160
|View full text |Cite
|
Sign up to set email alerts
|

Light-weight trust-based routing protocol for mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
82
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 126 publications
(82 citation statements)
references
References 15 publications
0
82
0
Order By: Relevance
“…Typically, the wireless node monitors neighbor node activity such as "packet forwarding", "packet drop", and "network link for successful packet delivery", however, these activities do not define node behavior. In [16], the authors discussed the effect of indirect observations on node propagation. A malicious node can lower the reliability of a normal node by propagating a negative message, while at the same time it can even recover node trust propagating a positive message also.…”
Section: Role Of Node Behavior For Trust Changesmentioning
confidence: 99%
See 1 more Smart Citation
“…Typically, the wireless node monitors neighbor node activity such as "packet forwarding", "packet drop", and "network link for successful packet delivery", however, these activities do not define node behavior. In [16], the authors discussed the effect of indirect observations on node propagation. A malicious node can lower the reliability of a normal node by propagating a negative message, while at the same time it can even recover node trust propagating a positive message also.…”
Section: Role Of Node Behavior For Trust Changesmentioning
confidence: 99%
“…Negative behavior nodes are isolated due to low trust and new untrusted nodes cannot join the network, so no new behavior is observed and the scope of node recovery is limited [16,21]. Marchang et al [3] propose an efficient plan for analyzing and optimizing the duration that IDS must remain active in MANET.…”
Section: Role Of Node Behavior For Trust Changesmentioning
confidence: 99%
“…As node 7 and node n r are neighbors (or in general node 7 have a route to n r ), node 7 sends a RREP, thus source node S receives 2 RREP and for CBDS it means there is malicious node(s) in the network so initiate second phase to detect the hypothetical malicious node. Therefore, the source node sends a RREQ' and in response receives P={S-1-2-3-4-5-6-7-n r } and K ′ i sets (6) and calculate S list (7) and T lists (8).…”
Section: Decrease False-positive Ratementioning
confidence: 99%
“…For example some mechanism works based on Intrusion Detection Systems (IDS) [4] and some nodes in the network play IDS role which is based on MANET specifications, IDS with dynamic hierarchical structure is a good choice [5]. Some other mechanisms are Trust Based [6][7][8][9], which is based on nodes' history and observation each node earns a trust level that is used for routing and detection. Usually these methods are more vulnerable to grayhole attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In view of the malicious node attack in WSNs, the trust model-based management mechanism is proven to be a popular and effective method [7]. Besides, trust evaluation model has low computation and communication load, which demonstrate a significant advantage in respect of solving the internal attacks and identifying the malicious nodes [8].…”
Section: Introductionmentioning
confidence: 99%