A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs

N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …

Study of trust‐based mechanism and its component model in MANET: Current research state, issues, and future recommendation

N Khanna, M Sachdeva - International Journal of …, 2019 - Wiley Online Library
Security against routing attacks in MANET is most critical issue and traditional concepts of
cryptography, authentication, or Watchdog are not that significant in mitigation of these …

A decentralized and reliable trust measurement for edge computing enabled Internet of Things

S Zhang, D Cao, Z Ning - Concurrency and Computation …, 2022 - Wiley Online Library
The combination of edge computing (EC) and the Internet of Things is a hot research topic.
And security is one of the most important problems to be solved. The trust measurement of …

Capitulation of mitigation techniques of packet drop attacks in MANET to foreground nuances and ascertain trends

S Singh, A Bhasin, A Kalia - International Journal of …, 2021 - Wiley Online Library
MANET is a kind of wireless ad hoc networks, in which mobile nodes operate in dynamic,
distributed, and cooperative environment. Open nature of MANET makes it vulnerable to …

BEST: Battery, Efficiency and Stability based trust mechanism using enhanced AODV for mitigation of Blackhole attack and its variants in MANETs.

N Khanna, M Sachdeva - Adhoc & Sensor Wireless …, 2020 - search.ebscohost.com
This paper attempts to resolve the issue of mitigation of blackhole attack and its variants by
presenting a battery, efficiency and stability based trust mechanism that performs both …

Trusted Network Evaluation Model Based on Comprehensive Trust

YIN Ansheng, H Haiping - Chinese Journal of Electronics, 2021 - Wiley Online Library
Trusted network is currently evaluated based on the trustworthiness of the nodes in the
network; thus, trust in the nodes is required to achieve trust in the network. The methods for …

A survey of trusted network trust evaluation methods

AS Yin, SY Zhang - Security and Privacy in New Computing Environments …, 2019 - Springer
The proposed trusted network is respond to the increasingly prominent internal network
security threats. At present, research on trusted networks focuses on two aspects: pre …

T‐D2D: A trust model for service offloading in device‐to‐device communication

Z Movahedi, Z Hosseini - Transactions on Emerging …, 2019 - Wiley Online Library
With the advances in pervasive computing, Internet of things (IoT) has gained considerable
attention from both research and industrial communities. While IoT devices are able to …

[引用][C] Green, trust and computation offloading perspectives to optimize network management and mobile services

Z Movahedi - 2018 - Thèse de doctorat, Sorbonne …