2010 International Conference on Availability, Reliability and Security 2010
DOI: 10.1109/ares.2010.87
|View full text |Cite
|
Sign up to set email alerts
|

Trust Based Multi Path DSR Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…The AODV network is also known as the Reactive Routing Protocols, as it is always available when the node is needed [12]. The following Figure 3.…”
Section: Adhoc On Demand Distance Vector Routingprotocolsmentioning
confidence: 99%
“…The AODV network is also known as the Reactive Routing Protocols, as it is always available when the node is needed [12]. The following Figure 3.…”
Section: Adhoc On Demand Distance Vector Routingprotocolsmentioning
confidence: 99%
“…Many researchers [9, 10, 17, 2224] have shown that trust-based routing approaches can gracefully mitigate insider packet drop attacks by building trusted paths to the destination. Moreover, they showed that trust-based routing improves the packet's successful delivery under insider packet drop attacks over routing algorithms that do not consider trust.…”
Section: A Selective Forwarding-based Dos Attackmentioning
confidence: 99%
“…Instead of choosing the shortest path as in the original DSR protocol, source node will choose the path with the highest trust value in trust-based routing scheme. Due to the concern of asymmetric of trust property, in [52], when the source node needs to choose a route for data transmission, it calculates bidirectional trust value of every available routing path and then selects the one with the highest value.…”
Section: Decision Makingmentioning
confidence: 99%