2016
DOI: 10.22266/ijies2016.1231.23
|View full text |Cite
|
Sign up to set email alerts
|

Mitigate Lying and On-Off Attacks on Trust Based Group Key Management Frameworks in MANETs

Abstract: Instant collaborative group communication can be achieved by deploying Mobile Ad Hoc Networks (or MANETs) without any pre-plan and pre-existing infrastructure setup. However, the curbs thrown by these networks, motivate the necessity of a group key management framework to secure data traffic. In this context, significant research work done in the last decade and proved that the trust based frameworks deliver better performance than others. In MANETs, trust quantified as the belief held by a node about another … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…A mathematical model with the Bayesian theory was introduced in [27][28][29][30], to update the reputation from direct observations. In [31][32][33][34][35][36][37][38], various trust models in a public key infrastructural network are discussed. These trust models are developed on a clustered mobile node network where security enhancement is certainly important.…”
Section: Trust Management In Manetmentioning
confidence: 99%
“…A mathematical model with the Bayesian theory was introduced in [27][28][29][30], to update the reputation from direct observations. In [31][32][33][34][35][36][37][38], various trust models in a public key infrastructural network are discussed. These trust models are developed on a clustered mobile node network where security enhancement is certainly important.…”
Section: Trust Management In Manetmentioning
confidence: 99%
“…With passive attacks, they can just copy the data traffic while with active they can modify the traffic also. To benefit from a system failure, selfish or malicious nodes can even send biased recommendations through attacks such as Black whole attack, Denial of Service attack, OnOff attack, Lying attack, Selective attack, Positional and Seasonable attacks [8,9].…”
Section: Attacks On Tmfsmentioning
confidence: 99%