2015
DOI: 10.1109/tpds.2014.2317719
|View full text |Cite
|
Sign up to set email alerts
|

Trust Management for Defending On-Off Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
38
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 71 publications
(38 citation statements)
references
References 26 publications
0
38
0
Order By: Relevance
“…In an on-off attack, 22 a compromised CH behaves normally and maliciously alternately that gives the victim an opportunity to succeed in the remote attestation. In the proposed scheme, once the compromised CH is detected, the remote agent enters the lock state.…”
Section: Security Analysismentioning
confidence: 99%
“…In an on-off attack, 22 a compromised CH behaves normally and maliciously alternately that gives the victim an opportunity to succeed in the remote attestation. In the proposed scheme, once the compromised CH is detected, the remote agent enters the lock state.…”
Section: Security Analysismentioning
confidence: 99%
“…Trust Management for Defending On-off Attacks [27] is introducing for on-off attack. They have demonstrated how predictability trust with sliding windows can allow for flexible design in which a system designer is able to decide the number of opportunities a node should be allowed before being eliminated from the system.…”
Section: Malicious Attack Detectionmentioning
confidence: 99%
“…The attacker switches between these two states. A high ratio of the Off state in relation to On state is a more effective attack but also makes it more easy for a trust management scheme to detect the malicious behavior [17].…”
Section: Trust Ismentioning
confidence: 99%