A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks

被引:47
|
作者
Ahmed, Adnan [1 ]
Abu Bakar, Kamalrulnizam [1 ]
Channa, Muhammad Ibrahim [2 ]
Haseeb, Khalid [1 ]
Khan, Abdul Waheed [1 ]
机构
[1] Univ Teknol Malaysia, Fac Comp, Johor Baharu 81310, Malaysia
[2] Quaid E Awam Univ Engn Sci & Technol, Dept Informat Technol, Nawabshah 67450, Pakistan
关键词
trust; reputation; wireless sensor network; mobile ad-hoc networks; routing; node misbehavior; REPUTATION SYSTEMS; WIRELESS NETWORKS; SELFISH NODES; SECURE; FRAMEWORK; MECHANISM; SCHEME; ESTABLISHMENT; MANAGEMENT; ATTACKS;
D O I
10.1007/s11704-014-4212-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained remarkable appreciation and technological development over the last few years. Despite ease of deployment, tremendous applications and significant advantages, security has always been a challenging issue due to the nature of environments in which nodes operate. Nodes' physical capture, malicious or selfish behavior cannot be detected by traditional security schemes. Trust and reputation based approaches have gained global recognition in providing additional means of security for decision making in sensor and ad-hoc networks. This paper provides an extensive literature review of trust and reputation based models both in sensor and ad-hoc networks. Based on the mechanism of trust establishment, we categorize the state-of-the-art into two groups namely node-centric trust models and system-centric trust models. Based on trust evidence, initialization, computation, propagation and weight assignments, we evaluate the efficacy of the existing schemes. Finally, we conclude our discussion with identification of some unresolved issues in pursuit of trust and reputation management.
引用
收藏
页码:280 / 296
页数:17
相关论文
共 50 条
  • [31] Detection of malicious node using Improved CONFIDANT Technique in Ad-hoc Networks
    Devi, Nirma
    Sunitha, R.
    [J]. PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 604 - 610
  • [32] Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks
    Ameneh Daeinabi
    Akbar Ghaffarpour Rahbar
    [J]. Multimedia Tools and Applications, 2013, 66 : 325 - 338
  • [33] New trust based security approach for ad-hoc networks
    Sharma, Sanjeev
    Mishra, Renu
    Kaur, Inderpreet
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 428 - 431
  • [34] Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks
    Qureshi, Kashif Naseer
    Nafea, Hanaa
    Tariq Javed, Ibrahim
    Zrar Ghafoor, Kayhan
    [J]. IEEE ACCESS, 2024, 12 : 95390 - 95401
  • [35] DETECTION OF MALICIOUS NODE IN MOBILE AD-HOC NETWORK
    Sangeetha, V
    Kumar, S. Swapna
    [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON POWER, SIGNALS, CONTROL AND COMPUTATION (EPSCICON), 2018,
  • [36] Trust-based routing for ad-hoc wireless networks
    Pirzada, AA
    Datta, A
    McDonald, C
    [J]. 2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 326 - 330
  • [37] Distributed Trust Based Routing in Mobile Ad-Hoc Networks
    Jain, Shalabh
    Baras, John S.
    [J]. 2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, : 1801 - 1807
  • [38] Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks
    Kshirsagar, Vishvas Haridas
    Kanthe, Ashok M.
    Simunic, Dina
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (02) : 311 - 320
  • [39] Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks
    Vishvas Haridas Kshirsagar
    Ashok M. Kanthe
    Dina Simunic
    [J]. Wireless Personal Communications, 2018, 100 : 311 - 320
  • [40] Trust establishment in pure ad-hoc networks
    Pirzada, A. A.
    McDonald, C.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2006, 37 (1-2) : 139 - 163