2020
DOI: 10.1007/978-981-15-4851-2_3
|View full text |Cite
|
Sign up to set email alerts
|

Entity-Centric Combined Trust (ECT) Algorithm to Detect Packet Dropping Attack in Vehicular Ad Hoc Networks (VANETs)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Tripathi et al [31] proposed an ECT (Entity-Centric Combined Trust) model based on cooperation among vehicles to detect packet drop attacks. In this model, the satisfaction level of a node is based on the closeness position, transition reliability, and contact frequency.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Tripathi et al [31] proposed an ECT (Entity-Centric Combined Trust) model based on cooperation among vehicles to detect packet drop attacks. In this model, the satisfaction level of a node is based on the closeness position, transition reliability, and contact frequency.…”
Section: Related Workmentioning
confidence: 99%
“…For example, the majority of these approaches [15], [30], [32] rely on additional IDS and control packets, which cause excessive routing overhead and delay. Similarly, approaches like [22], [29], [31] are dependent on clustering, trust value, and cryptographic techniques. The major drawbacks of these approaches are the generation of significant routing overhead due to the continuous formation of clusters and the exchange of heavy-weightage information among nodes.…”
Section: Related Workmentioning
confidence: 99%
“…In the indirect reputation, each vehicle assigns a point to its neighbor vehicles and the nearest roadside unit after calculating the combined reputation for a particular vehicle; one can determine whether the vehicle is reliable by comparing the calculated values with the defned threshold values or not. [83] employs trustbased security measures to identify malicious activities, encompassing packet dropping and packet modifcation/ modifcation attacks. Te algorithm is rooted in direct and indirect trust, allowing for the computation of trust value and satisfaction of a given node sans supplementary control overhead.…”
Section: Sharma Et Al's Modelmentioning
confidence: 99%