A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks

被引:47
|
作者
Ahmed, Adnan [1 ]
Abu Bakar, Kamalrulnizam [1 ]
Channa, Muhammad Ibrahim [2 ]
Haseeb, Khalid [1 ]
Khan, Abdul Waheed [1 ]
机构
[1] Univ Teknol Malaysia, Fac Comp, Johor Baharu 81310, Malaysia
[2] Quaid E Awam Univ Engn Sci & Technol, Dept Informat Technol, Nawabshah 67450, Pakistan
关键词
trust; reputation; wireless sensor network; mobile ad-hoc networks; routing; node misbehavior; REPUTATION SYSTEMS; WIRELESS NETWORKS; SELFISH NODES; SECURE; FRAMEWORK; MECHANISM; SCHEME; ESTABLISHMENT; MANAGEMENT; ATTACKS;
D O I
10.1007/s11704-014-4212-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained remarkable appreciation and technological development over the last few years. Despite ease of deployment, tremendous applications and significant advantages, security has always been a challenging issue due to the nature of environments in which nodes operate. Nodes' physical capture, malicious or selfish behavior cannot be detected by traditional security schemes. Trust and reputation based approaches have gained global recognition in providing additional means of security for decision making in sensor and ad-hoc networks. This paper provides an extensive literature review of trust and reputation based models both in sensor and ad-hoc networks. Based on the mechanism of trust establishment, we categorize the state-of-the-art into two groups namely node-centric trust models and system-centric trust models. Based on trust evidence, initialization, computation, propagation and weight assignments, we evaluate the efficacy of the existing schemes. Finally, we conclude our discussion with identification of some unresolved issues in pursuit of trust and reputation management.
引用
收藏
页码:280 / 296
页数:17
相关论文
共 50 条
  • [1] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Adnan Ahmed
    Kamalrulnizam Abu Bakar
    Muhammad Ibrahim Channa
    Khalid Haseeb
    Abdul Waheed Khan
    [J]. Frontiers of Computer Science, 2015, 9 : 280 - 296
  • [2] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Adnan AHMED
    Kamalrulnizam ABU BAKAR
    Muhammad Ibrahim CHANNA
    Khalid HASEEB
    Abdul Waheed KHAN
    [J]. Frontiers of Computer Science., 2015, 9 (02) - 296
  • [3] Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks
    Khan, Uzma
    Agrawal, Shikha
    Silakari, Sanjay
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 965 - 972
  • [4] A Novel Approach for Malicious Nodes Detection in Ad-hoc Networks Based on Cellular Learning Automata
    Aghababa, Amir Bagheri
    Fathinavid, Amirhosein
    Salari, Abdolreza
    Zavareh, Seyedeh Elaheh Flaghayegh
    [J]. PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 82 - 88
  • [5] The impact of malicious nodes on the performance of wireless Ad-hoc networks
    Hallani, Houssein
    Shahrestani, Seyed A.
    [J]. MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 596 - +
  • [6] Malicious node detection in ad-hoc wireless networks
    Griswold, RL
    Medidi, S
    [J]. DIGITAL WIRELESS COMMUNITCATIONS V, 2003, 5100 : 40 - 50
  • [7] Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks
    Rikli, Nasser-Eddine
    Alnasser, Aljawharah
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (07): : 1 - 16
  • [8] Advanced detection of selfish or malicious nodes in ad hoc networks
    Kargl, F
    Klenk, A
    Schlott, S
    Weber, M
    [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
  • [9] Trust-oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks
    Buksh, Waqas
    Guo, Ying
    Iqbal, Saleem
    Qureshi, Kashif Naseer
    Lloret, Jaime
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [10] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks
    Rahman, Mohsin Ur
    Abbas, Sohail
    Latif, Seemab
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194