2016
DOI: 10.1109/comst.2015.2496147
|View full text |Cite
|
Sign up to set email alerts
|

Trust-Distortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
54
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 84 publications
(55 citation statements)
references
References 33 publications
0
54
0
Order By: Relevance
“…A weakness of using fuzzy logic is that storing the rules database might involve a significant amount of memory. As a future work direction, we plan to investigate defence mechanisms for attacks such as bad-mouthing, ballot-stuffing, and collusion [25] [26] posed by dishonest nodes.…”
Section: Discussionmentioning
confidence: 99%
“…A weakness of using fuzzy logic is that storing the rules database might involve a significant amount of memory. As a future work direction, we plan to investigate defence mechanisms for attacks such as bad-mouthing, ballot-stuffing, and collusion [25] [26] posed by dishonest nodes.…”
Section: Discussionmentioning
confidence: 99%
“…The stability of the network in the literature is presented in different viewpoints by different researchers [1,2,10,[12][13][14]. These define the network traffic dimension associated with traditional communication networks and the survival concept of the network based on services, all of which are the primary concern for network reliability and node resilience [15].…”
Section: Related Workmentioning
confidence: 99%
“…Typically, IDS should always run on all nodes to supervise network activity. Z. Movahedi et al [1]. It presents a holistic view of the various trust management frameworks that are suitable for MANET and can handle key existing attacks that mislead confidence calculations to mislead trust-based network operations, known as trust distortion attacks.…”
Section: Role Of Node Behavior For Trust Changesmentioning
confidence: 99%
“…With the aim to provide security, trust-based security systems were presented in different network architectures [40][41][42][43]. To overcome the drawbacks of conventional security systems, the uncertainty reasoning has been assessed as the probabilistic technique with trust in MANET where mobility is considered with greater importance [38,39].…”
Section: Trust For Manet Scalabilitymentioning
confidence: 99%
“…A mathematical model with the Bayesian theory was introduced in [27][28][29][30], to update the reputation from direct observations. In [31][32][33][34][35][36][37][38], various trust models in a public key infrastructural network are discussed. These trust models are developed on a clustered mobile node network where security enhancement is certainly important.…”
Section: Trust Management In Manetmentioning
confidence: 99%