2014 International Conference on Intelligent Computing Applications 2014
DOI: 10.1109/icica.2014.67
|View full text |Cite
|
Sign up to set email alerts
|

Trust Based Security Schemes in Mobile Ad Hoc Networks - A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…Once authentication is achieved, remaining security requirements such as confidentiality, integrity and non-reputation [8] can be achieved easily. To achieve authentication, shared secret, Public Key Infrastructure [PKI], digital signature, digital certificate [10] are used but these techniques are centralized, pre-determined and depend on trusted third party, thereby increasing computation power, memory and consumption of communication bandwidth and battery power but MANET has limited resource constrains. To provide security with limited computational capabilities trust comes into existence because it offers less memory overhead, less transmission overhead and less bandwidth consumption [11].…”
Section: Authentication and Trustsmentioning
confidence: 99%
“…Once authentication is achieved, remaining security requirements such as confidentiality, integrity and non-reputation [8] can be achieved easily. To achieve authentication, shared secret, Public Key Infrastructure [PKI], digital signature, digital certificate [10] are used but these techniques are centralized, pre-determined and depend on trusted third party, thereby increasing computation power, memory and consumption of communication bandwidth and battery power but MANET has limited resource constrains. To provide security with limited computational capabilities trust comes into existence because it offers less memory overhead, less transmission overhead and less bandwidth consumption [11].…”
Section: Authentication and Trustsmentioning
confidence: 99%
“…This is used to enable each node to adjust its route request forwarding rate according to its evaluated trust score. Sivagurunathan S et.al [21], proposed a light weight trust based security model to ensure authentication and detect the malicious nodes. In this model trust calculation is accomplished by combining the responses from its neighbors and depending upon the capacity of their work done, thereby ensures the authentication among the nodes by the way security can be achieved.…”
Section: Related Workmentioning
confidence: 99%
“…Once authentication is achieved, remaining security requirements such as confidentiality, integrity and non-reputation [3] can be achieved easily. To achieve authentication, shared secret, Public Key Infrastructure [PKI], digital signature, digital certificate [5] are used but these techniques are centralized, pre-determined and depend on trusted third party, thereby increasing computation power, memory and consumption of communication bandwidth and battery power but MANET has limited resource constrains. To provide security with limited computational capabilities trust comes into existence because it offers less memory overhead, less transmission overhead and less bandwidth consumption [6].…”
Section: Introductionmentioning
confidence: 99%
“…Sivagurunathan S et.al [24], proposed a light weight trust based security model to ensure authentication and detect the malicious nodes. In this model trust calculation is accomplished by combining the responses from its neighbors and depending upon capacity of their work done, thereby ensures the authentication among the nodes by the way security can be achieved.…”
Section: Review Of Literaturementioning
confidence: 99%
“…Once an authentication is achieved, remaining security requirements can be achieved easily. To achieve authentication, shared secret, Public Key Infrastructure [PKI], digital signature, digital certificate [5] [6] are used but these techniques are centralized, pre-determined depend on trusted third party there by increasing computation power, memory and consumption of communication bandwidth and battery power.…”
Section: Introductionmentioning
confidence: 99%