2017
DOI: 10.1007/s11036-017-0867-0
|View full text |Cite
|
Sign up to set email alerts
|

Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…Several trust-based approaches have been proposed to ensure security in distributed systems. Khan et al [11] attempt to isolate malicious nodes in MANET systems. When the trust of a node in the network drops below a specific threshold, the node is considered malicious, and is isolated.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Several trust-based approaches have been proposed to ensure security in distributed systems. Khan et al [11] attempt to isolate malicious nodes in MANET systems. When the trust of a node in the network drops below a specific threshold, the node is considered malicious, and is isolated.…”
Section: Discussionmentioning
confidence: 99%
“…(ii) We combine the identified operations into candidate plans. Each candidate is (iii) evaluated by one of the two utility functions (local or global) defined in Equation (10) and Equation (11). Finally, in (iv), the planner forwards the best fit the plan for enactment to j 9 .…”
Section: Decentralized Feedback Loop Demonstratorsmentioning
confidence: 99%
See 1 more Smart Citation
“…Decentralized&Adaptive Trust Several trust-based approaches have been proposed to ensure security in distributed systems. Khan et al [146] attempt to isolate malicious nodes in MANET systems. When the trust of a node in the network drops below a specific threshold, the node is considered malicious, and is isolated.…”
Section: Related Workmentioning
confidence: 99%
“…Current trust-based security solutions focus on allowing or disallowing communications in the system at the granularity of nodes. These approaches are often domain-specific and focus on either defending against specific attacks or identifying and/or isolating malicious nodes (e.g., [2,146]) based on trust metrics [287] or reputation-based trust [2,234]. They are, however, unable to enforce fine-grained entity-level security policies to control access, modification or propagation of information.…”
Section: Introductionmentioning
confidence: 99%