Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network

K Juneja - Wireless Personal Communications, 2021 - Springer
The existence of a non-cooperative or black hole node as an intermediate node in a mobile
network can degrade the performance of the network and affects the trust of neighbor nodes …

Trusted Routing Protocol for Flying Ad Hoc Networks.

Z Beiying, JI Weifeng, W Jiang… - Journal of Frontiers …, 2021 - search.ebscohost.com
Aiming at the problems of being vulnerable to internal attacks and frequent link interruption
in flying ad hoc networks (FANETs), a trust-based ad hoc on-demand multipath distance …

TAODV Trust based AODV Protocol in MANETS to Mitigate Black Hole Effect

MPS Chaitanya, BS Chowdary… - … Computing and Data …, 2023 - ieeexplore.ieee.org
Because of its inbuilt qualities and the media that they employ, wireless networks are
susceptible to a wide variety of security breaches. In order for a node to transmit data, it must …

Security enhancement in MANETs using fuzzy-based trust computation against black hole attacks

AK Jain, V Tokekar, S Shrivastava - Information and Communication …, 2018 - Springer
Mobile ad hoc networks (MANETs) are much more susceptible to routing attacks as
compared to wired networks and infrastructure-based wireless networks. MANETs lack …

Consensus routing and environmental discrete trust based secure AODV in MANETs

RR Chandan - International Journal of Computer Networks & …, 2020 - papers.ssrn.com
Abstract The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-
less communication, and it provides numerous applications in different areas. The MANET is …

[PDF][PDF] Fuzzy Reputation Based Trust Mechanism for Mitigating Attacks in MANET.

S Maheswari, R Vijayabhasker - Intelligent Automation & Soft …, 2023 - cdn.techscience.cn
Mobile Ad-hoc Networks (MANET) usage across the globe is increasing by the day.
Evaluating a node's trust value has significant advantages since such network applications …

Trust aware cooperative routing method for WANETs

PR Vamsi, K Kant - Security and Communication Networks, 2016 - Wiley Online Library
Abstract Wireless Ad‐hoc NETworks are prone to various internal security attacks such as
black hole, gray hole, packet modification, etc., because of decentralized and open network …

A novel trust routing scheme based on node behaviour evaluation for mobile AD hoc networks

H Chen, F Zhongchuan - Intelligent Automation & Soft Computing, 2011 - Taylor & Francis
With the rapid application and development of mobile ad hoc network, security and trust aze
important to the network. As the vazious attack models, we need trust routing scheme to …

Impact of trust model on on-demand multi-path routing in mobile ad hoc networks

H Xia, Z Jia, L Ju, X Li, EHM Sha - Computer Communications, 2013 - Elsevier
A mobile ad hoc network (MANET) is a set of limited range wireless nodes, which works well
only if those mobile nodes are trusty and behave cooperatively. However, MANETs are …

[PDF][PDF] Secure trust based dynamic source routing in MANETs

YK Jain, NK Sharma - … Journal of Scientific & Engineering Research, 2012 - academia.edu
Secure routing is an important issue in MANETs. A particularly devastating attack in wireless
networks is the black hole attack. The performance of ad hoc networks depends on …