2021
DOI: 10.24138/jcomss-2021-0049
|View full text |Cite
|
Sign up to set email alerts
|

Towards Trust Model in Unmanned Aerial Vehicle Ad Hoc Networks

Abstract: Unmanned Aerial Vehicle ad hoc networks (UAANETs) are originally designed to work in a cooperative environment. These networks are vulnerable to a wide range of attacks due to the lack of predefined infrastructure and the dynamic topology. Security in ad hoc networks, in general, is handled through authentication and encryption. This can be considered as a heavy way to protect the network due to the lack of resources in the nodes. However, trust can be introduced to address a light weight solution for some sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 20 publications
0
0
0
Order By: Relevance
“…Trust [1,[4][5][6]13,17,18,20,25,29,35,36,40,46,49,[54][55][56][57][58][59][60][61][62][63][64][65][66][67].…”
Section: Category Papersunclassified
See 2 more Smart Citations
“…Trust [1,[4][5][6]13,17,18,20,25,29,35,36,40,46,49,[54][55][56][57][58][59][60][61][62][63][64][65][66][67].…”
Section: Category Papersunclassified
“…A novel malicious node detection method, enhanced reputation calculation, involvement of a distributed trust concept in calculations, and overall performance improvements were proposed as a result of the challenges in unmanned aerial vehicle ad hoc network (UAANET) research, which include the lack of security and trustworthiness, resource overusage, energy consumption, memory constraints, and preventing selfish node attacks [57]. These challenges were addressed to achieve a fully trusted network in UAANET.…”
Section: Trustmentioning
confidence: 99%
See 1 more Smart Citation
“…Within the realm of UAV trust measurement research, the literature [9] employs data packet forwarding history and recommendation information from neighboring nodes to calculate the trustworthiness of other nodes. However, this trust mechanism exhibits a limitation in that it relies on a single trust assessment factor and cannot effectively address issues such as link failures.…”
Section: Introductionmentioning
confidence: 99%
“…The above research has laid a good foundation for the research on the trust evaluation model of UAV nodes, but some of the literature ignores the influence of trust timeliness on trust evaluation in the direct trust degree calculation [12,13], which can not reflect well on node behavior, which reduces the accuracy of trust calculation. The trust evaluation of UAVs in the other literature still has shortcomings such as the single trust evaluation factor [9,15], relatively fixed trust evaluation weight [11], high communication overhead [10,14,15], unreasonable trust evaluation [16], etc. Furthermore, while much of the current research is centered around assessing the reputation of UAVs, there is a notable lack of attention directed toward establishing robust mechanisms for credible reputation management.…”
Section: Introductionmentioning
confidence: 99%