2013
DOI: 10.1007/s13369-013-0764-1
|View full text |Cite
|
Sign up to set email alerts
|

Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…We can classify all the works that try to mitigate and stimulate the misbehaved or uncooperative node into four categories: “credit-based systems” (Anderegg and Eidenbenz, 2003; Buttyan and Hubaux, 2001; Jiang et al , 2015; Yang et al , 2002; Zhong et al , 2003), “acknowledgement-based systems” (Liu et al , 2007; Padmanabhan and Simon, 2003; Xue and Nahrstedt, 2004), “trust management and reputation-based systems” (Buchegger and Le Boudec, 2002; He et al , 2004; Marti et al , 2000; Michiardi and Molva, 2002; Sen, 2010; Velloso et al , 2010) and “trust-based routing protocols” (De Rango and Marano, 2009; Ghosh et al , 2005; Lupia and De Rango, 2014; Mohanapriya and Krishnamurthi, 2014; Serique and De Sousa, 2012; Wang and Wu, 2011; Xia, Jia, Ju, Li and Sha, 2013; Xia et al , 2015). Some of the related previous works that have been carried out in order to make ad hoc networks more trustworthy are explained in this section.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We can classify all the works that try to mitigate and stimulate the misbehaved or uncooperative node into four categories: “credit-based systems” (Anderegg and Eidenbenz, 2003; Buttyan and Hubaux, 2001; Jiang et al , 2015; Yang et al , 2002; Zhong et al , 2003), “acknowledgement-based systems” (Liu et al , 2007; Padmanabhan and Simon, 2003; Xue and Nahrstedt, 2004), “trust management and reputation-based systems” (Buchegger and Le Boudec, 2002; He et al , 2004; Marti et al , 2000; Michiardi and Molva, 2002; Sen, 2010; Velloso et al , 2010) and “trust-based routing protocols” (De Rango and Marano, 2009; Ghosh et al , 2005; Lupia and De Rango, 2014; Mohanapriya and Krishnamurthi, 2014; Serique and De Sousa, 2012; Wang and Wu, 2011; Xia, Jia, Ju, Li and Sha, 2013; Xia et al , 2015). Some of the related previous works that have been carried out in order to make ad hoc networks more trustworthy are explained in this section.…”
Section: Related Workmentioning
confidence: 99%
“…Recent research works focus on the manner to evaluate the trust of communication entities in wireless networks based on various theories (Guo et al , 2011) such as probabilistic estimation, information theory, fuzzy theory and game theory which have been used for designing the trust metrics. Based on this framework, several trust management models have been proposed for MANETs (De Rango and Marano, 2009; Lupia and De Rango, 2014; Mohanapriya and Krishnamurthi, 2014; Velloso et al , 2010; Xia, Jia and Sha, 2013; Xia et al , 2015), where trust can be defined as a degree of belief about the behaviour and the ability of other entities to offer services timely, integrally and reliably (Xia, Jia, Ju, Li and Zhu, 2011). However, these trust models may be inappropriate to react to malign and collusion attacks, because of the decision factors that are often incomplete in the trust derivation, which are not fully integrated with the inherent characteristics of MANETs.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, in order to balance selfish vs. altruistic behaviors, they also identified the best design condition of this behavior model. The authors in [16] designed a routing solution that enables the dynamic source routing protocol to find a secure end-to-end route free of black hole nodes with the cooperation from the neighbors. Also this solution can protect the network in the presence of colluding attackers without the need of promiscuous monitoring the neighbor nodes.…”
Section: Trust-based Routing Protocols In Manetsmentioning
confidence: 99%
“…It supports both unidirectional and asymmetric links. Route Discovery and Route Maintenance phases are used to achieve reliable routing in DSR [16][17][18].…”
Section: Dsr Protocol Description and Its Implicationsmentioning
confidence: 99%
“…This model also utilizes the voting mechanism to punish the malicious nodes. The author [17] proposed a trusted based DSR routing protocol also known as TBDSR to identify the collaborative black hole attacks based on route request and forward credit. Other than this work, the authors [18] [ [23][24][25][26] discuss various trust based mechanisms.…”
Section: Related Workmentioning
confidence: 99%