A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks作者机构:Faculty of Computing Universiti Teknologi Malaysia Johor Bahru 81310 Malaysia Department of Information Technology Quaid-e-Awam University of Engineering Science and Technology Nawabshah 67450 Pakistan
出 版 物:《Frontiers of Computer Science》 (中国计算机科学前沿(英文版))
年 卷 期:2015年第9卷第2期
页 面:280-296页
核心收录:
学科分类:080904[工学-电磁场与微波技术] 0810[工学-信息与通信工程] 0809[工学-电子科学与技术(可授工学、理学学位)] 080202[工学-机械电子工程] 08[工学] 080402[工学-测试计量技术及仪器] 0804[工学-仪器科学与技术] 081001[工学-通信与信息系统] 0802[工学-机械工程]
主 题:trust reputation wireless sensor network mo-bile ad-hoc networks routing node misbehavior
摘 要:Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained remarkable apprecia- tion and technological development over the last few years. Despite ease of deployment, tremendous applications and significant advantages, security has always been a challeng- ing issue due to the nature of environments in which nodes operate. Nodes' physical capture, malicious or selfish behav- ior cannot be detected by traditional security schemes. Trust and reputation based approaches have gained global recog- nition in providing additional means of security for decision making in sensor and ad-hoc networks. This paper provides an extensive literature review of trust and reputation based models both in sensor and ad-hoc networks. Based on the mechanism of trust establishment, we categorize the state- of-the-art into two groups namely node-centric trust mod- els and system-centric trust models. Based on trust evidence, initialization, computation, propagation and weight assign- ments, we evaluate the efficacy of the existing schemes. Fi- nally, we conclude our discussion with identification of some unresolved issues in pursuit of trust and reputation manage- ment.