2015
DOI: 10.1007/s11276-015-1010-4
|View full text |Cite
|
Sign up to set email alerts
|

Towards a novel trust-based opportunistic routing protocol for wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(10 citation statements)
references
References 37 publications
0
10
0
Order By: Relevance
“…Different trust computational approaches have been introduced as different trust models. Our study shows that E2TX [52], RTOR [180] and its close relatives, TORDP and GEOTOR [181], are metrics that accommodate trust via a very simple direct trust model. ETOR [33] extends the trust model to include indirect trust.…”
Section: A Parameters Developmentmentioning
confidence: 83%
See 1 more Smart Citation
“…Different trust computational approaches have been introduced as different trust models. Our study shows that E2TX [52], RTOR [180] and its close relatives, TORDP and GEOTOR [181], are metrics that accommodate trust via a very simple direct trust model. ETOR [33] extends the trust model to include indirect trust.…”
Section: A Parameters Developmentmentioning
confidence: 83%
“…• Reliable Trust-based OR (RTOR), TORDP, GEOTOR: [180] and [181] consider the trustworthiness of a neighboring node as well as its link reliability by defining a new metric, RT OR. Each node i calculates its neighboring node j's RTOR according to the following:…”
Section: • Multicast Expected Advancement Rate (Mear) I-mearmentioning
confidence: 99%
“…Beyond mobile crowdsensing, the notion of computational trust has been employed to solve many research problems related to the QoI, including e-commerce [93,124]. Among the fields closely related to mobile crowdsensing, we include sensor networks [9,83,84,137,163], opportunistic networks [32,99,153,198], and social networks [59,197], to name a few. However, establishing trust in mobile crowdsensing poses some unique challenges that cannot be addressed solely with existing trust frameworks.…”
Section: Related Workmentioning
confidence: 99%
“…Comparing the established model with the SAT model [8] and the DCT model [9], the results show that with the increase of malicious nodes in the network, the trust mechanism established in this paper has better anti-interference ability. 2) Combine the node trust degree and ETX value, and compare with the four routing algorithms TBOR [10], RTOR [11], TAODV, and EXOR to conduct comparative experiments on throughput, end-to-end delay, and packet delivery rate. Simulation results show that combining the trust model and OR protocol proposed in this paper can significantly improve the communication performance in harsh environments.…”
Section: Introductionmentioning
confidence: 99%