A novel fuzzy trust-based secure routing scheme in flying ad hoc networks

M Hosseinzadeh, AH Mohammed, FA Alenizi… - Vehicular …, 2023 - Elsevier
Today, many studies assess vulnerabilities, threats, and attacks in flying ad hoc networks
(FANETs) to provide solutions for countermeasures. Protecting FANETs against attackers …

A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks

A Beghriche, A Bilami - International Journal of Intelligent Computing …, 2018 - emerald.com
Purpose Security is one of the major challenges in the design and implementation of
protocols for mobile ad hoc networks (MANETs). In such systems, the cooperation between …

Trust prediction and trust-based source routing in mobile ad hoc networks

H Xia, Z Jia, X Li, L Ju, EHM Sha - Ad Hoc Networks, 2013 - Elsevier
Mobile ad hoc networks (MANETs) are spontaneously deployed over a geographically
limited area without well-established infrastructure. The networks work well only if the mobile …

Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory

H Xia, Z Jia, L Ju, Y Zhu - IET wireless sensor systems, 2011 - IET
Owing to the openness in network topology and the absence of centralised administration in
management, mobile ad hoc network (MANET) is vulnerable to attacks from malicious …

Light-weight trust-based routing protocol for mobile ad hoc networks

N Marchang, R Datta - IET information security, 2012 - IET
Mobile ad hoc networks (MANETs) were originally designed for a cooperative environment.
To use them in hostile environments, trust-based routing can be used, where instead of …

Enhancing the Routing Security through Node Trustworthiness using Secure Trust Based Approach in Mobile Ad Hoc Networks.

M Reddy, PVS Srinivas… - International Journal of …, 2022 - search.ebscohost.com
Abstract Mobile Ad Hoc Networks, also known as MANET's are the part of many
heterogeneous networks which utilizes the technologies like Internet of Things. Internet is …

A trust-based routing protocol for ad hoc networks

X Xue, J Leneutre, J Ben-Othman - IFIP International Conference on …, 2004 - Springer
Ad hoc networks are particularly vulnerable as compare to traditional networks mainly due to
their lack of infrastructure. A malicious node can easily disrupt both the routing discovery …

Towards designing a trusted routing solution in mobile ad hoc networks

T Ghosh, N Pissinou, KS Makki - Mobile Networks and Applications, 2005 - Springer
Designing a trusted and secure routing solution in an untrustworthy scenario is always a
challenging problem. Lack of physical security and low trust levels among nodes in an ad …

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks

H Xia, J Yu, Z Pan, X Cheng, EHM Sha - Wireless Networks, 2016 - Springer
Due to the characteristics of mobile ad hoc networks, such networks are more susceptible to
the destruction of malicious attacks or denial of cooperation. It would be easy for an …

Trust‐oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks

W Buksh, Y Guo, S Iqbal, KN Qureshi… - Transactions on …, 2024 - Wiley Online Library
Abstract Flying Ad Hoc Networks (FANETs) are gaining popularity due to its extra‐ordinary
features in avionics and electronics domain. FANETs are also considered as most powerful …