2018
DOI: 10.1109/access.2018.2822945
|View full text |Cite
|
Sign up to set email alerts
|

Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
36
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 81 publications
(37 citation statements)
references
References 29 publications
0
36
0
Order By: Relevance
“…Rutvij H. Jhaveri et al [17] performed affectability examination of TRS-PD which is finished by moving characteristics of different parameters specifically framework circumstances within the sight of three unquestionable group dropping attacks. Besides, their work gathers the attack structure disclosure framework, trust model, and routing segment grasped by TRS-PD in order to counter the adversaries which seek after certain attack plans close by various enemies.…”
Section: Fig4 Direct Trust Observationmentioning
confidence: 99%
“…Rutvij H. Jhaveri et al [17] performed affectability examination of TRS-PD which is finished by moving characteristics of different parameters specifically framework circumstances within the sight of three unquestionable group dropping attacks. Besides, their work gathers the attack structure disclosure framework, trust model, and routing segment grasped by TRS-PD in order to counter the adversaries which seek after certain attack plans close by various enemies.…”
Section: Fig4 Direct Trust Observationmentioning
confidence: 99%
“…As shown in above figure we analyze the different authentication schemes. Some of the recent schemes on new technologies are proposed in [24][25][26][27][28][29][30][31], [32][33][34][35][36][37][38][39][40], we recommend readers to study these.…”
Section: Introductionmentioning
confidence: 99%
“…Two-party protocols can be widely used in various fields such as cloud computing (Gao et al 2018;Tian et Ibtihal et al 2017;Zheng and Wang 2018), file encryption , verifiable computation , keyword searching (Li et al 2015) and trust evaluation (Jiang et al 2016(Jiang et al , 2018Jhaveri et al 2018). Normally, the security of two-party protocols is discussed with a single external attacker, who is assumed to arbitrarily sabotage the protocols by corrupting at most one party.…”
Section: Introductionmentioning
confidence: 99%