A trust change detection mechanism in mobile ad-hoc networks

被引:6
|
作者
Chatzidakis, Michail [1 ]
Hadjiefthymiades, Stathes [1 ]
机构
[1] Univ Athens, Dept Informat & Telecommun, Athens 15784, Greece
关键词
MANET; Trust; Cohesion; Cluster; Clusterhead; MANAGEMENT;
D O I
10.1016/j.comcom.2022.02.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The versatility and efficiency of mobile ad-hoc networks comes at a certain cost. The network nodes are exposed to a variety of attacks and at the same time they are under memory, processing and energy limitations. Once deployed, the network should operate for as long as possible, mitigating security threats and ensuring the integrity of the data exchanged. This article describes our research on the field, proposing a mechanism to identify malicious nodes and promptly alerting the network. In addition, the same mechanism is used to restore the trust of a malicious node, in case it resumes healthy operation or it was a misclassification issue. The mechanism can be fine-tuned to balance the sensitivity of the reaction and the timely detection of a status change, as required.
引用
收藏
页码:155 / 163
页数:9
相关论文
共 50 条
  • [41] Detection of packet forwarding misbehavior in mobile ad-hoc networks
    Gonzalez, Oscar F.
    Howarth, Michael
    Pavlou, George
    WIRED/WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2007, 4517 : 302 - +
  • [42] Intrusion detection using mobile agent in ad-hoc networks
    Xia, Y
    Li, RF
    Li, KL
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 3383 - 3388
  • [43] A Survey of Intrusion Detection Systems for Mobile Ad-Hoc Networks
    Alriyami, Qasim M.
    Asimakopoulou, Eleana
    Bessis, Nik
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 427 - 432
  • [44] Trust in mobile Ad Hoc Networks
    Veeraraghavan, Prakash
    Limaye, Vikram
    ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 330 - 334
  • [45] Trust establishment in pure ad-hoc networks
    Pirzada, A. A.
    McDonald, C.
    WIRELESS PERSONAL COMMUNICATIONS, 2006, 37 (1-2) : 139 - 163
  • [46] Modeling Trust in Wireless Ad-Hoc Networks
    Ghosh, Tirthankar
    Xu, Hui
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 217 - 221
  • [47] Detection of Dishonest Trust Recommendations in Mobile Ad Hoc Networks
    Zakirullah
    Islam, M. Hasan
    Khan, Adnan Ahmed
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [48] Trust Establishment In Pure Ad-hoc Networks
    A. A. Pirzada
    C. Mcdonald
    Wireless Personal Communications, 2006, 37 : 139 - 168
  • [49] Trust Assessment in Wireless Ad-hoc Networks
    Hallani, H.
    Shahrestani, S. A.
    2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 425 - 429
  • [50] Improving Trust Management in Ad-hoc Networks
    Shwayat, Doaa
    Shurman, Mohammad
    2024 15TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS, ICICS 2024, 2024,