2020
DOI: 10.1109/access.2020.2978143
|View full text |Cite
|
Sign up to set email alerts
|

Trust Routing Protocol Based on Cloud-Based Fuzzy Petri Net and Trust Entropy for Mobile Ad hoc Network

Abstract: The trust-based routing mechanisms are proposed to enhance the security of the mobile ad hoc network (MANET), which use the performance metrics of a node to evaluate the trust value of the node. However, some performance metrics are fuzzy, which are easier to be described qualitatively than to be expressed quantitatively. Therefore, the inability to quantitatively express these performance metrics leads to the inaccuracy in the calculation of the trust values of nodes. Meanwhile, some routing mechanisms add th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 39 publications
0
13
0
Order By: Relevance
“…The work of Smith et al [27] has harnessed the potential of the existing security scheme capable of secure communication among mobile nodes, access control, and authentication of mobile nodes in MANET. The work carried out by Wang et al [28] have developed a secure trustbased routing scheme where Petri net is used along with fuzzy logic to ascertain the eligibility of the nodes using OLSR protocol. Doss et al [29] have presented a scheme for identifying and preventing novice forms of attack in MANET.…”
Section: Review Of Literaturementioning
confidence: 99%
“…The work of Smith et al [27] has harnessed the potential of the existing security scheme capable of secure communication among mobile nodes, access control, and authentication of mobile nodes in MANET. The work carried out by Wang et al [28] have developed a secure trustbased routing scheme where Petri net is used along with fuzzy logic to ascertain the eligibility of the nodes using OLSR protocol. Doss et al [29] have presented a scheme for identifying and preventing novice forms of attack in MANET.…”
Section: Review Of Literaturementioning
confidence: 99%
“…Through the analysis of Part I of the paper, the SBR algorithm proposed in this paper uses a similar way to AODV-SLR [ 30 ] to build backup routes. Meanwhile, algorithms that improve stability of the MANET involved in the literature [ 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 ] mainly focus on the routing protocol itself rather than backup routes. Therefore, we chose AODV-SLR algorithm as the comparison object of computer simulation.…”
Section: Simulation and Analysismentioning
confidence: 99%
“…Similarly in DYMO-SBR, DYMO completes the main route building process using its path accumulation function. Actually, SBR can also cooperate with other QoS-guaranteed Ad hoc routing protocols, such as algorithms presented in [ 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 ], to further improve the network performance. The simulation parameters are shown in Table 1 .…”
Section: Simulation and Analysismentioning
confidence: 99%
See 2 more Smart Citations