2017
DOI: 10.1007/978-3-319-67910-5_5
|View full text |Cite
|
Sign up to set email alerts
|

Trust Based Monitoring Approach for Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…In any computer-related environment, security is considered as a nonfunctional requirement, which is not only used to maintain the availability and reliability of the whole system but also related to the protection of information and system. However, in wireless sensor networks, security issues are particularly important because on the one hand, the hardware functions of network nodes are seriously limited, and it is necessary to provide sufficient protection to protect them from malicious attacks; on the other hand, the deployment environment of wireless sensor networks makes it easy for the enemy to obtain sensor nodes illegally and destroy them [1][2][3][4]. Any destruction and interference to nodes will have a certain impact on the information obtained in the real world.…”
Section: Security Standards and Challengesmentioning
confidence: 99%
“…In any computer-related environment, security is considered as a nonfunctional requirement, which is not only used to maintain the availability and reliability of the whole system but also related to the protection of information and system. However, in wireless sensor networks, security issues are particularly important because on the one hand, the hardware functions of network nodes are seriously limited, and it is necessary to provide sufficient protection to protect them from malicious attacks; on the other hand, the deployment environment of wireless sensor networks makes it easy for the enemy to obtain sensor nodes illegally and destroy them [1][2][3][4]. Any destruction and interference to nodes will have a certain impact on the information obtained in the real world.…”
Section: Security Standards and Challengesmentioning
confidence: 99%
“…Schemes like [15][16][17][18][19], exploit the Watchdog mechanism for local reputation builds up. Watchdog mechanism is based on passive acknowledgments which suffers from ambiguous collision and receiver collision problems [20], some authors devised their schemes that use monitoring based on explicit acknowledgments [21,22] at the cost of augmented communication overhead and some authors, such as [23][24][25], use other techniques for direct observation collection. For better detection accuracy, these schemes collaboratively detect selfish nodes thereby enabling nodes to disseminate their direct experience in the form of first-hand reputation ratings in the network.…”
Section: Related Workmentioning
confidence: 99%