2012
DOI: 10.1109/tmc.2011.160
|View full text |Cite
|
Sign up to set email alerts
|

An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks

Abstract: Abstract-Delay/Disruption Tolerant Networks (DTNs) have been identified as one of the key areas in the field of wireless communication, wherein sparseness and delay are particularly high. They are emerging as a promising technology in vehicular, planetary/interplanetary, military/tactical, disaster response, underwater and satellite networks. DTNs are characterized by large endto-end communication latency and the lack of end-to-end path from a source to its destination. These characteristics pose several chall… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 75 publications
(33 citation statements)
references
References 47 publications
0
33
0
Order By: Relevance
“…Therefore, we adopt vector and node meet, they exchange the trusted routing tables TRT , TRT with each other. After the update operation, as shown in Table 3, the trusted routing tables TRT , TRT of node and node contain five row vectors send trusted routing table TRT to node ; (8) receive trusted routing table TRT from node ; (9) end (10) while ∀ ∈ TRT ∩ TRT do (11) if TRT ⋅ ⋅ TwID > TRT ⋅ ⋅ TwID then (12) verify the validity of the signature Sig ; (13) if Sig is valid then (14) update row vector in trusted routing table TRT ; (15) TRT ⋅ = TRT ⋅ ; (16) TRT ⋅ ⋅ TwID = TRT ⋅ ⋅ TwID; (17) TRT ⋅ Sig = TRT ⋅ Sig ; (18) end ( Robustness Analysis. In the building and updating process of the trusted routing table, the malicious node may modify the trusted routing table to forge high trust value and message forwarding ratio.…”
Section: Building and Updating Trusted Routingmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, we adopt vector and node meet, they exchange the trusted routing tables TRT , TRT with each other. After the update operation, as shown in Table 3, the trusted routing tables TRT , TRT of node and node contain five row vectors send trusted routing table TRT to node ; (8) receive trusted routing table TRT from node ; (9) end (10) while ∀ ∈ TRT ∩ TRT do (11) if TRT ⋅ ⋅ TwID > TRT ⋅ ⋅ TwID then (12) verify the validity of the signature Sig ; (13) if Sig is valid then (14) update row vector in trusted routing table TRT ; (15) TRT ⋅ = TRT ⋅ ; (16) TRT ⋅ ⋅ TwID = TRT ⋅ ⋅ TwID; (17) TRT ⋅ Sig = TRT ⋅ Sig ; (18) end ( Robustness Analysis. In the building and updating process of the trusted routing table, the malicious node may modify the trusted routing table to forge high trust value and message forwarding ratio.…”
Section: Building and Updating Trusted Routingmentioning
confidence: 99%
“…, ); (10) if ⋅ > ⋅ then (11) get copy number nc from head field of ; (12) calculate nc using Eq. (8); (13) forwards a copy of with copy number nc to node ; (14) updates nc ← nc − nc ; (15) else (16) if ⋅ == 0 and ⋅ == 0 then (17) calculate , of node and node ; (18) if == 0 and == 0 then (19) forwards a copy of to node ; (20) else…”
Section: Security and Efficient Routing Based On Trtmentioning
confidence: 99%
See 1 more Smart Citation
“…To the best of our knowledge, only [2,3,11,13,24] used feedback mechanisms or indirect recommendations for trust management. In addition, [2,3] used discrepancies of indirect recommendations for adversary detection. Not leveraging direct-observation based trust/reputation deriving from social networking is a main drawback of these approaches.…”
Section: Related Workmentioning
confidence: 99%
“…A limitation of their work is that no consideration was given to inside attackers. [2,3] designed an iterative trust management scheme for DTNs. They used authentication as the underlying mechanism to evaluate a node.…”
Section: Related Workmentioning
confidence: 99%