… a new trust aware and secure RPL routing protocol referred to … evaluated along with routing attacks (Rank and Sybil) detection and isolation. Fuzzy logic-based trust allows only trusted …
… Moreover, we evaluate proposed … attacks against routing protocols in [14]. For example, to find papers related to defending against wormhole attack using trust mechanism in routing, we …
H Xia, S Zhang, Y Li, Z Pan, X Peng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… In order to precisely evaluate the uncertainty of trust relationships among vehicles, Sun et al. [12] proposed a membership cloud-based trustevaluation model for VANET of …
YL Sun, Z Han, W Yu, KJR Liu - Proceedings IEEE INFOCOM …, 2006 - ieeexplore.ieee.org
… For ad hoc routing, we investigate the trust values associated with two actions: forwarding packets and making recommendations. Briefly speaking, each node maintains its …
T Yang, X Xiangyang, L Peng, L Tonghui… - Procedia computer …, 2018 - Elsevier
… the malicious attacks from … Routing(EOSR) based on distributed trustevaluation model to identify and isolate Malicious node. EOSR routing protocol designed a multi-factor routing …
H Yang - Mobile Information Systems, 2020 - Wiley Online Library
… Therefore, the routing provided in the MANET should have security features that can reduce the damage to various attacks. For this, in this paper, it is proposed for a trustevaluation …
… 2) We introduce a trustevaluation scheme that combines the concept of AHP to calculate the creditability trust of a node by taking the cross-layer metrics with a focus mainly on the …
S Umeda, S Takeda, H Shigeno - 2015 Eighth International …, 2015 - ieeexplore.ieee.org
… a trustevaluation method adapted to node behavior. We introduce the adaptive time window which is the time period for evaluating a trust … In this way, each node calculates trust values …
… In Section 3, we describe the application of a trust-based scheme to three native reactive routing protocols. In Section 4, we evaluate the efficacy of the protocols through exhaustive …