2020
DOI: 10.1109/access.2020.3020129
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Opportunistic Routing Based on Node Trust Model

Abstract: In vehicular ad hoc networks, opportunistic routing can effectively improve the reliability and throughput. However, opportunistic routing also has security issues. For example, malicious nodes can easily mix into node candidate sets, which can interfere with network performance. In this paper, a trust model based on node behavior is proposed for solving the problem of malicious nodes in the opportunistic routing and forwarding candidate set. The proposed trust model uses pruning and filtering mechanisms to re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…Su et al [27] suggested a trust model based opportunistic routing (BTOR). BTOR filters forwarding nodes based on their behavior to combat malicious nodes.…”
Section: B Game Theory-based Opportunistic Routingmentioning
confidence: 99%
See 1 more Smart Citation
“…Su et al [27] suggested a trust model based opportunistic routing (BTOR). BTOR filters forwarding nodes based on their behavior to combat malicious nodes.…”
Section: B Game Theory-based Opportunistic Routingmentioning
confidence: 99%
“…To compare the performance of our method, we use the traditional Q-routing method [40]. In addition, the trust-based opportunistic routing (BTOR) [27], Q-learning-based routing protocols such as SAQ [28], and Qlearning-based multihop cooperative routing (QMCR) [29] schemes, which were recently published in papers reporting state-of-the-art results, were also selected.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Reference [ 35 ] proposes a trust model based on node behavior to deal with malicious nodes in opportunistic routing and forwarding candidate set. By using pruning and filtering mechanisms, it deletes malicious suggestions and uses dynamic weight calculation method to combine direct trust and indirect trust to get the comprehensive trust.…”
Section: Common Applications Of Trustmentioning
confidence: 99%
“…Su et al, [16] applied the trust model to opportunistic routing for the first time, and the calculation of trust value was based on the direct trust degree of direct interaction and the recommendation trust degree similar to trust; however, the parameter values used to calculate the direct trust degree mostly depend on expert experience. It will affect the objective evaluation of the trust model to a certain extent.…”
Section: Introductionmentioning
confidence: 99%