Attacks on trust evaluation in distributed networks

YL Sun, Z Han, W Yu, KJR Liu - 2006 40th Annual Conference …, 2006 - ieeexplore.ieee.org
… present several attacks that can undermine the accuracy of trust evaluation, … attacks and
defense, we implement a trust evaluation system in ad hoc networks for securing ad hoc routing

A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… a new trust aware and secure RPL routing protocol referred to … evaluated along with routing
attacks (Rank and Sybil) detection and isolation. Fuzzy logic-based trust allows only trusted

Trust mechanisms to secure routing in wireless sensor networks: Current state of the research and open research issues

F Ishmanov, Y Bin Zikria - Journal of Sensors, 2017 - Wiley Online Library
… Moreover, we evaluate proposed … attacks against routing protocols in [14]. For example, to
find papers related to defending against wormhole attack using trust mechanism in routing, we …

An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks

H Xia, S Zhang, Y Li, Z Pan, X Peng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… In order to precisely evaluate the uncertainty of trust relationships among vehicles, Sun et
al. [12] proposed a membership cloud-based trust evaluation model for VANET of …

A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks

YL Sun, Z Han, W Yu, KJR Liu - Proceedings IEEE INFOCOM …, 2006 - ieeexplore.ieee.org
… For ad hoc routing, we investigate the trust values associated with two actions: forwarding
packets and making recommendations. Briefly speaking, each node maintains its …

A secure routing of wireless sensor networks based on trust evaluation model

T Yang, X Xiangyang, L Peng, L Tonghui… - Procedia computer …, 2018 - Elsevier
… the malicious attacks from … Routing(EOSR) based on distributed trust evaluation model
to identify and isolate Malicious node. EOSR routing protocol designed a multi-factor routing

A study on improving secure routing performance using trust model in MANET

H Yang - Mobile Information Systems, 2020 - Wiley Online Library
… Therefore, the routing provided in the MANET should have security features that can reduce
the damage to various attacks. For this, in this paper, it is proposed for a trust evaluation

A cross-layer trust evaluation protocol for secured routing in communication network of smart grid

D Velusamy, G Pugalendhi… - IEEE Journal on …, 2019 - ieeexplore.ieee.org
… 2) We introduce a trust evaluation scheme that combines the concept of AHP to calculate
the creditability trust of a node by taking the cross-layer metrics with a focus mainly on the …

Trust evaluation method adapted to node behavior for secure routing in mobile ad hoc networks

S Umeda, S Takeda, H Shigeno - 2015 Eighth International …, 2015 - ieeexplore.ieee.org
… a trust evaluation method adapted to node behavior. We introduce the adaptive time window
which is the time period for evaluating a trust … In this way, each node calculates trust values …

Performance comparison of trust-based reactive routing protocols

AA Pirzada, C McDonald, A Datta - IEEE transactions on mobile …, 2006 - ieeexplore.ieee.org
… In Section 3, we describe the application of a trust-based scheme to three native reactive
routing protocols. In Section 4, we evaluate the efficacy of the protocols through exhaustive …