2019
DOI: 10.1002/dac.4012
|View full text |Cite
|
Sign up to set email alerts
|

Study of trust‐based mechanism and its component model in MANET: Current research state, issues, and future recommendation

Abstract: SummarySecurity against routing attacks in MANET is most critical issue and traditional concepts of cryptography, authentication, or Watchdog are not that significant in mitigation of these attacks. In recent years, trust‐based approach provides a reputation system that compose of different components to provide security against routing attacks. In this paper, we provide an in‐depth analysis of various components that are used in trust‐based mechanism and techniques deployed in effective and efficient executio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 45 publications
0
8
0
Order By: Relevance
“…Past interaction history (PIH) has (Table 5) quality factors such as source node location, receiver node location, time taken to transmit packets, minimum route path, and trust values. This PIH is exposed below table 6 by the terms like network id, node pattern, trust value, node lifetime, efficiency, and bandwidth [58]. The network lifetime is determined by the ratio of confirmed acknowledgment to the whole number of possible node transmissions on reaching the prescribed Trust Values (TV).…”
Section: Past Interaction History With Transmission Datamentioning
confidence: 99%
“…Past interaction history (PIH) has (Table 5) quality factors such as source node location, receiver node location, time taken to transmit packets, minimum route path, and trust values. This PIH is exposed below table 6 by the terms like network id, node pattern, trust value, node lifetime, efficiency, and bandwidth [58]. The network lifetime is determined by the ratio of confirmed acknowledgment to the whole number of possible node transmissions on reaching the prescribed Trust Values (TV).…”
Section: Past Interaction History With Transmission Datamentioning
confidence: 99%
“…Although these algorithms improve the rating prediction accuracy of recommendation systems, they are at the cost of time or low coverage. Therefore, they fail to work well in cold start cases, and data sparsity remains a stubborn challenge [37]. Inspired by the problem, our paper attempts to alleviate this problem by introducing the implicit trust recommendation approach.…”
Section: Related Workmentioning
confidence: 99%
“…However, the railway cyber infrastructure and networks currently only adopt rudimentary defenses (e.g., cryptography), which provide protection against the most basic threats, forfeiting effective ways of detecting advanced cyber-attacks [26]. While initially designed as closed systems, current infrastructure networks are vulnerable to various network layer attacks, like blackhole, badmouthing, and jamming attacks [27].…”
Section: Introductionmentioning
confidence: 99%