Trust in mobile Ad Hoc Networks

被引:1
|
作者
Veeraraghavan, Prakash [1 ]
Limaye, Vikram [1 ]
机构
[1] La Trobe Univ, Dept Comp Sci & Comp Engn, Bundoora, Vic 3086, Australia
来源
ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS | 2007年
关键词
AODV; MANET; SID; trust management;
D O I
10.1109/ICTMICC.2007.4448655
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Securing a Wireless Ad Hoc Network is a major concern for researchers. Due to varied characteristics of Ad Hoc Networks, they are vulnerable to internal as well as external attacks. Many solutions have been proposed and currently being improved upon in this area. Most of these solutions involve encryption; secure routing, key management etc. Each of them is designed to operate in a particular situation, which may fail to work successfully in other scenarios. The present work in this paper offers an alternate to improve the trustworthiness of the neighbourhood and secure the routing procedure. It helps in computing the trust in neighbours and selecting the most secure route from the available ones for the data transfer. It also helps detecting the compromised node and virtually it removing from the network.
引用
收藏
页码:330 / 334
页数:5
相关论文
共 50 条
  • [1] Trust Establishment in Mobile Ad Hoc Networks
    Kartha, Geethu Krishna
    Neeba, E. A.
    2014 3RD INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS (ICECCS 2014), 2014, : 133 - 137
  • [2] A Survey on Trust Management for Mobile Ad Hoc Networks
    Cho, Jin-Hee
    Swami, Ananthram
    Chen, Ing-Ray
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04): : 562 - 583
  • [3] Trust Management for Collusion Prevention in Mobile Ad Hoc Networks
    Seredynski, Marcin
    Bouvry, Pascal
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 508 - 513
  • [4] Detection of Dishonest Trust Recommendations in Mobile Ad Hoc Networks
    Zakirullah
    Islam, M. Hasan
    Khan, Adnan Ahmed
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [5] PROBABILISTIC TRUST MONITORING MODEL FOR MOBILE AD HOC NETWORKS
    Shabut, Antesar M.
    Dahal, Keshav
    PROCEEDINGS OF THE EUROPEAN CONFERENCE ON DATA MINING 2015 AND INTERNATIONAL CONFERENCES ON INTELLIGENT SYSTEMS AND AGENTS 2015 AND THEORY AND PRACTICE IN MODERN COMPUTING 2015, 2015, : 97 - 104
  • [6] cTrust: Trust Management in Cyclic Mobile Ad Hoc Networks
    Zhao, Huanyu
    Yang, Xin
    Li, Xiaolin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (06) : 2792 - 2806
  • [7] Trust based Security schemes in Mobile Ad Hoc Networks - A Review
    Sivagurunathan, S.
    Prathapchandran, K.
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING APPLICATIONS (ICICA 2014), 2014, : 291 - 295
  • [8] A Trust-Distortion Resistant Trust Management Scheme on Mobile Ad Hoc Networks
    Hosseini, Zahra
    Movahedi, Zeinab
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5167 - 5183
  • [9] Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
    Cho, Jin-Hee
    Swami, Ananthram
    Chen, Ing-Ray
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 1001 - 1012
  • [10] Distributed Management System for Trust and Reward in Mobile Ad hoc Networks
    Goka, Sonoko
    Shigeno, Hiroshi
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,