期刊文献+

A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks 被引量:16

A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
原文传递
导出
摘要 Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained remarkable apprecia- tion and technological development over the last few years. Despite ease of deployment, tremendous applications and significant advantages, security has always been a challeng- ing issue due to the nature of environments in which nodes operate. Nodes' physical capture, malicious or selfish behav- ior cannot be detected by traditional security schemes. Trust and reputation based approaches have gained global recog- nition in providing additional means of security for decision making in sensor and ad-hoc networks. This paper provides an extensive literature review of trust and reputation based models both in sensor and ad-hoc networks. Based on the mechanism of trust establishment, we categorize the state- of-the-art into two groups namely node-centric trust mod- els and system-centric trust models. Based on trust evidence, initialization, computation, propagation and weight assign- ments, we evaluate the efficacy of the existing schemes. Fi- nally, we conclude our discussion with identification of some unresolved issues in pursuit of trust and reputation manage- ment. Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained remarkable apprecia- tion and technological development over the last few years. Despite ease of deployment, tremendous applications and significant advantages, security has always been a challeng- ing issue due to the nature of environments in which nodes operate. Nodes' physical capture, malicious or selfish behav- ior cannot be detected by traditional security schemes. Trust and reputation based approaches have gained global recog- nition in providing additional means of security for decision making in sensor and ad-hoc networks. This paper provides an extensive literature review of trust and reputation based models both in sensor and ad-hoc networks. Based on the mechanism of trust establishment, we categorize the state- of-the-art into two groups namely node-centric trust mod- els and system-centric trust models. Based on trust evidence, initialization, computation, propagation and weight assign- ments, we evaluate the efficacy of the existing schemes. Fi- nally, we conclude our discussion with identification of some unresolved issues in pursuit of trust and reputation manage- ment.
出处 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第2期280-296,共17页 中国计算机科学前沿(英文版)
关键词 TRUST REPUTATION wireless sensor network mo-bile ad-hoc networks ROUTING node misbehavior trust, reputation, wireless sensor network, mo-bile ad-hoc networks, routing, node misbehavior
  • 相关文献

参考文献100

  • 1Tsetsos V, Alyfantis G, Hasiotis T, Sekkas O, Hadjiefthymiades S. To- wards commercial wireless sensor networks: business and technology architecture. Ad Hoc & Sensor Wireless Networks, 2006, 2(1): 59-80.
  • 2Padmavathi G, Shanmugapriya D. A survey of attacks, security mecha- nisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security (IJCSIS), 2009, 4(1): 1-9.
  • 3Jain A, Kant K, Tripathy M. Security solutions for wireless sensor net- works. In: Proceedings of the 2nd IEEE International Conference on Advanced Computing & Communication Technologies (ACCT). 2012, 430-433.
  • 4Zhou Z, Yow K C. Geographic ad hoc routing security: attacks and Ad Hoc & Sensor Wireless Networks, 2005, 1(3) 235-253.
  • 5Becher A, Benenson Z, Dornseif M. Tampering with motes: real- world physical attacks on wireless sensor networks. Technical Report. Springer Berlin Heidelberg, 2006.
  • 6He D, Gao Y, Chan S, Chela C, Bu J. An enhanced Two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 2010, 10(4): 361-371.
  • 7Srinivasan A, Teitelbaum J, Liang H, Wu J, Cardei M. Reputation and trust-based systems for ad hoc and sensor networks. In: Boukerche A, ed. Algorithms and Protocols fol' Wireless, Mobile Ad Hoc Networks. Ottawa: Wiley, 2008, 375--403.
  • 8Devisri S, Balasubramaniam C. Secure routing using trust based mech- anism in wireless sensor networks (WSNs). International Journal of Scientific & Engineering Research, 2013, 4(2): 1-7.
  • 9Babu S S, Raha A, Naskar M K. LSR protocol based on nodes poten- tiality in trust and residual energy for WSNs. International Journal of Network Security & Its Applications (LINSA), 2012, 4(2): 21-34.
  • 10Yu Y, Li K, Zhou W, Li E Trust mechanisms in wireless sensor net- works: attack analysis and countermeasures. Journal of Network and Computer Applications, 2012, 35(3): 867-880.

同被引文献66

  • 1吴启武,刘青子.基于贝叶斯理论的VANET安全路由信任模型[J].四川大学学报(工程科学版),2015,47(2):129-135. 被引量:12
  • 2孙华丽,谢剑英,薛耀锋.带容量约束的多车调度暂态混沌神经网络算法[J].上海交通大学学报,2006,40(7):1148-1151. 被引量:4
  • 3I.F. Akyildiz,W. Su,Y. Sankarasubramaniam,E. Cayirci.Wireless sensor networks: a survey[J]. Computer Networks . 2002 (4)
  • 4Malik Tubaishat,Sanjay Madria.Sensor networks: an overview. IEEE Potentials . 2003
  • 5Wenjing Wang,Mainak Chatterjee,Kevin Kwiat,Qing Li.??A game theoretic approach to detect and co-exist with malicious nodes in wireless networks(J)Computer Networks . 2014
  • 6Hongjuan Li,Keqiu Li,Wenyu Qu,Ivan Stojmenovic.??Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks(J)Future Generation Computer Systems . 2013
  • 7Shigen Shen,Yuanjie Li,Hongyun Xu,Qiying Cao.??Signaling game based strategy of intrusion detection in wireless sensor networks(J)Computers and Mathematics with Applications . 2011 (6)
  • 8B. Sun,K. Wu,U.W. Pooch.'Zone-based Intrusion Detection for Mobile Ad Hoc Networks,'. International Journal of Ad Hoc and Sensor Wireless Networks . 2003
  • 9PARDESHI B,TOSHNIWAL D.Improved k-medoids clustering basedon cluster validity index and object density. Proc of the 2nd IEEE International Advance Computing Conference . 2010
  • 10GAO D Y,YANG B R.An impronved k-medoids clustering algo rithm. Proc of the 2nd International Conference on Computer and Autonmation Engineering (ICCAE) . 2010

引证文献16

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部