2011
DOI: 10.1109/surv.2011.092110.00088
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Trust Management for Mobile Ad Hoc Networks

Abstract: Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when collaboration or cooperation is critical to achieving mission and system goals such as reliability, availability, scalability, and reconfigurability. In defining and managing trust in a military MANET, we must consider the interactions between the composite cognitive, social, information and communication networks, and take into account the severe resource constraints (e.g., computing power, energy, bandwidth, time), and dynamics… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
342
0
6

Year Published

2012
2012
2022
2022

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 559 publications
(348 citation statements)
references
References 97 publications
0
342
0
6
Order By: Relevance
“…Trust should be contextdependent, and subjective, and cannot be assumed to be transitive or reciprocal. To address these unique trust properties, trust management for MANETs should consider the following design features: trust metrics must be customizable, evaluation of trust should be fully distributed without reliance on a centralized authority, and trust management should cope with dynamics and adverse behaviors in a tactical MANET [6].…”
Section: System Modelmentioning
confidence: 99%
“…Trust should be contextdependent, and subjective, and cannot be assumed to be transitive or reciprocal. To address these unique trust properties, trust management for MANETs should consider the following design features: trust metrics must be customizable, evaluation of trust should be fully distributed without reliance on a centralized authority, and trust management should cope with dynamics and adverse behaviors in a tactical MANET [6].…”
Section: System Modelmentioning
confidence: 99%
“…The trust establishment component infers if a node can be trusted based on its trust level. Jin-Hee Cho [1] provided an overview on various potential attacks like Routing loop attacks, Worm hole attacks, Black hole attacks, Gray hole attack, Denial of Service (DoS) attacks, False information or false recommendation, Incomplete information, Packet modification /insertion, Newcomer attacks, Black mailing, Replay attacks, Sybil attacks, Selective misbehaving attacks in MANETs. Depending on design mode J. Cho [1] explained trust management scheme like secure routing, authentication, intrusion detection, access control, key management, and trust evidence distribution and evaluation etc.…”
Section: Related Workmentioning
confidence: 99%
“…Consequently, a trust management framework should particularly care of such trust-distortion attacks. A current survey shows [1][2] [6] that trust management frameworks dealing with trust-distortion attacks has not been provided. So a holistic view of existing trust management frameworks able to cope with trust-distortion attacks is provided.…”
Section: Introductionmentioning
confidence: 99%
“…In both cases, the trustworthiness is a level of trust, varying from 0 (complete distrust) to 1 (complete trust). Evaluation of the trust of different entities in various network environments have been widely studied, e.g., [6]- [11].…”
Section: Introductionmentioning
confidence: 99%