A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks

被引:47
|
作者
Ahmed, Adnan [1 ]
Abu Bakar, Kamalrulnizam [1 ]
Channa, Muhammad Ibrahim [2 ]
Haseeb, Khalid [1 ]
Khan, Abdul Waheed [1 ]
机构
[1] Univ Teknol Malaysia, Fac Comp, Johor Baharu 81310, Malaysia
[2] Quaid E Awam Univ Engn Sci & Technol, Dept Informat Technol, Nawabshah 67450, Pakistan
关键词
trust; reputation; wireless sensor network; mobile ad-hoc networks; routing; node misbehavior; REPUTATION SYSTEMS; WIRELESS NETWORKS; SELFISH NODES; SECURE; FRAMEWORK; MECHANISM; SCHEME; ESTABLISHMENT; MANAGEMENT; ATTACKS;
D O I
10.1007/s11704-014-4212-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained remarkable appreciation and technological development over the last few years. Despite ease of deployment, tremendous applications and significant advantages, security has always been a challenging issue due to the nature of environments in which nodes operate. Nodes' physical capture, malicious or selfish behavior cannot be detected by traditional security schemes. Trust and reputation based approaches have gained global recognition in providing additional means of security for decision making in sensor and ad-hoc networks. This paper provides an extensive literature review of trust and reputation based models both in sensor and ad-hoc networks. Based on the mechanism of trust establishment, we categorize the state-of-the-art into two groups namely node-centric trust models and system-centric trust models. Based on trust evidence, initialization, computation, propagation and weight assignments, we evaluate the efficacy of the existing schemes. Finally, we conclude our discussion with identification of some unresolved issues in pursuit of trust and reputation management.
引用
收藏
页码:280 / 296
页数:17
相关论文
共 50 条
  • [41] Modeling Trust in Wireless Ad-Hoc Networks
    Ghosh, Tirthankar
    Xu, Hui
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 217 - 221
  • [42] On trust establishment in mobile ad-hoc networks
    Eschenauer, L
    Gligor, VD
    Baras, J
    [J]. SECURITY PROTOCOLS, 2004, 2845 : 47 - 62
  • [43] TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks
    Deb, Novarun
    Chaki, Nabendu
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (CISIM), 2012, 7564 : 80 - 91
  • [44] Quantifying trust in mobile ad-hoc networks
    Virendra, M
    Jadliwala, M
    Chandrasekaran, M
    Upadhyaya, S
    [J]. 2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70
  • [45] Trust Establishment In Pure Ad-hoc Networks
    A. A. Pirzada
    C. Mcdonald
    [J]. Wireless Personal Communications, 2006, 37 : 139 - 168
  • [46] Trust Assessment in Wireless Ad-hoc Networks
    Hallani, H.
    Shahrestani, S. A.
    [J]. 2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 425 - 429
  • [47] A survey on intrusion detection and prevention in wireless ad-hoc networks
    Khan, Khalid
    Mehmood, Amjad
    Khan, Shafiullah
    Khan, Muhammad Altaf
    Iqbal, Zeeshan
    Mashwani, Wali Khan
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 105
  • [48] A Survey of Intrusion Detection Systems for Mobile Ad-Hoc Networks
    Alriyami, Qasim M.
    Asimakopoulou, Eleana
    Bessis, Nik
    [J]. 2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 427 - 432
  • [49] Trust-based Approaches to Solve Routing Issues in Ad-hoc Wireless Networks: A Survey
    Gonzalez, Jesus M.
    Anwar, Mohd
    Joshi, James B. D.
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 556 - 563
  • [50] A survey of authentication mechanisms - Authentication for ad-hoc wireless sensor networks
    Boyle, D.
    Newe, T.
    [J]. 2007 IEEE SENSORS APPLICATIONS SYMPOSIUM, 2007, : 107 - +