Comprehensive Trust Based Scheme to Combat Malicious Nodes in MANET Based Cyber Physical Systems

被引:1
|
作者
Bhalaji, N. [1 ]
Selvaraj, Chithra [1 ]
机构
[1] SSN Coll Engn, Dept Informat Technol, Kalavakkam 603110, Tamil Nadu, India
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS | 2017年 / 508卷
关键词
Trust; Cyber physical system; Security; Malicious attacks; Multicast routing protocol; ODMRP;
D O I
10.1007/978-981-10-2750-5_56
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A large scale Wireless Sensor Network (WSN) or Mobile Ad hoc Network is to be definitely integrated into Internet as a backbone of Cyber Physical System (CPS), it is indispensable to believe that Cyber physical systems are free from security challenges, such as the detection of malicious attacks. A trust based model is attributed as an important door to defend a large distributed sensor networks in CPS. Trust is perceived as a critical tool to detect malicious node attacks in distributed computing and communication entities, detection of unreliable entities, and uphold decision-making process of various protocols. In this paper, Trust is invoked between participating nodes to improve the performance of Cyber physical systems by improving the degree of cooperation among them. The proposed schemes are also used to establish reliable path in packet forwarding and route finding. The realism, robustness and effectiveness of the proposed model is validated through a broad set of simulations.
引用
收藏
页码:543 / 550
页数:8
相关论文
共 50 条
  • [21] Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks
    Qureshi, Kashif Naseer
    Nafea, Hanaa
    Tariq Javed, Ibrahim
    Zrar Ghafoor, Kayhan
    IEEE ACCESS, 2024, 12 : 95390 - 95401
  • [22] Trust Based Security in MANET Routing Protocols: A Survey
    Poonam
    Garg, K.
    Misra, M.
    PROCEEDINGS OF THE FIRST AMRITA ACM-W CELEBRATION OF WOMEN IN COMPUTING IN INDIA (A2WIC), 2010,
  • [23] Mobile Agent Security Based on Trust Model in MANET
    Chowdhury, Chandreyee
    Neogy, Sarmistha
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 129 - 140
  • [24] Dealing with Collusion Attack in a Trust-Based MANET
    Abassi, Ryma
    CYBERNETICS AND SYSTEMS, 2018, 49 (7-8) : 475 - 496
  • [25] Blockchain-Based Secure Trust Management Scheme for Internet of Vehicles Over Cyber-Physical System
    Chunduri, Venkata
    Alsaadi, Mahmood
    Gupta, Sachin
    Ahanger, Tariq Ahamed
    Gopi, Adapa
    Alghayadh, Faisal Yousef
    Shavkatov, Navruzbek
    Mahato, Ganesh Kumar
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024,
  • [26] Trust-based distributed Kalman filtering for target tracking under malicious cyber attacks
    Liang, Chen
    Wen, Fuxi
    Wang, Zhongmin
    INFORMATION FUSION, 2019, 46 : 44 - 50
  • [27] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Ahmed, Adnan
    Abu Bakar, Kamalrulnizam
    Channa, Muhammad Ibrahim
    Haseeb, Khalid
    Khan, Abdul Waheed
    FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) : 280 - 296
  • [28] Security similarity based trust in cyber space
    Bahtiyar, Serif
    Caglayan, Mehmet Ufuk
    KNOWLEDGE-BASED SYSTEMS, 2013, 52 : 290 - 301
  • [29] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Adnan Ahmed
    Kamalrulnizam Abu Bakar
    Muhammad Ibrahim Channa
    Khalid Haseeb
    Abdul Waheed Khan
    Frontiers of Computer Science, 2015, 9 : 280 - 296
  • [30] An Efficient Certificateless Aggregate Signature Scheme for Blockchain-Based Medical Cyber Physical Systems
    Shu, Hong
    Qi, Ping
    Huang, Yongqing
    Chen, Fulong
    Xie, Dong
    Sun, Liping
    SENSORS, 2020, 20 (05)