2014
DOI: 10.1007/s11276-014-0793-z
|View full text |Cite
|
Sign up to set email alerts
|

Agent-based trusted on-demand routing protocol for mobile ad-hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…• Modification attack: a node may illegally modify the packet passing through it including data packet and control packet. To cope with the above adversary attack model, we design a light-weight trust management model according to existing modes [13], [14], [34]- [37]. The proposed model derives nodes' trust level based on two types of trust, direct trust from direct observations and indirect trust recommended by the third node.…”
Section: B Light-weight Trust Management Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…• Modification attack: a node may illegally modify the packet passing through it including data packet and control packet. To cope with the above adversary attack model, we design a light-weight trust management model according to existing modes [13], [14], [34]- [37]. The proposed model derives nodes' trust level based on two types of trust, direct trust from direct observations and indirect trust recommended by the third node.…”
Section: B Light-weight Trust Management Modelmentioning
confidence: 99%
“…TPB scheme is different from traditional trust-based routing schemes [13], [14]. TPB prevents malicious nodes from route discovery.…”
mentioning
confidence: 99%
“…The lack of centralized administration and resource constraint is the key issue that causes dishonest and nonco-operative nodes. Therefore MANET is vulnerable to serious attacks [4][5] [6] [7]. Some of the usual routing attacks are a wormhole, black hole, stealthy, and rushing attack [3][8] [9].…”
Section: Need For Security In Routing Protocolsmentioning
confidence: 99%
“…It helps to connect the devices from the source to the destination without he need of stable infrastructure and any fixed establishment of accessible resources [1]. Several times, when the mobile users need to connect with the wireless structure at that point this help to communicate from one user to the another users with the help of this wireless technology and this can reduce the infrastructure requirement that can also easy to maintain and less security issues and there is no need to create space environment because it is movable connection that can easily handle within several temporal conditions [2].To demonstrate this concept, take an example if the group of users want to communicate with one-another for some organization purpose, if the one of the user is travelling at a point and the other users are at other places then there is no need to create a permanent network [3], at these type of conditions users can dynamically create an temporary connection that will help to communicate with oneanother [4].…”
Section: Introductionmentioning
confidence: 99%