Hierarchical with Strong Authentication Reduction Scheme in Manets
نویسنده
چکیده
Many existing reputation systems sharply divide the trust value into right or wrong, thus ignoring another core dimension of trust: uncertainty. As uncertainty deeply impacts a node’s anticipation of others’ behavior and decisions during interaction. Besides lacking a precise semantic, this information has abstracted away any notion of time. This approach is objective and robust. But, this approach still leaves an opportunity for elaborate attackers to launch false accusation attacks since there is no constraint on update frequency. This approach also lacks the ability to separate newcomers from misbehavers.. Uncertainty originates from information asymmetry and opportunism. It reflects whether a trustor has collected enough information from past interactions with a trustee and its confidence in that information. So in this paper the concept of uncertainty and its role in trust evaluation. It Propose a certainty-oriented reputation system. This present various proactive and reactive mobility assisted uncertainty reduction schemes. Keywords-uncertainty, reputation, strong authentication
منابع مشابه
Efficient Source Authentication for Multicasting in MANETs
1 Abstract— In this paper, we investigate a popular source authentication scheme, TESLA (Timed Efficient Stream Loss-tolerant Authentication) for multicast communication in mobile ad hoc networks. We evaluate the performance of a source authentication scheme inspired from TESLA and TESLA based on simulations. Time synchronization is a crucial assumption made by these schemes. We describe effect...
متن کاملPerformance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme can be used effectively in selfsecuring MANETs suffering from high packet-loss due to presence of noise and node mobility. In order to evaluate the performance of the TSS scheme in noisy MANETs, a number of simulations w...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملCurrent Topics in Security of Mobile Ad-hoc NETworks
Although security issues in Mobile Ad-hoc NETworks (MANETs) have been a major focus in the recent years, the development of fully secure schemes for these networks has not been entirely achieved till now. This talk will provide an overview of two of the most important security problems in MANETs: Authentication and Cooperation. On the one hand, a brief summary of the current state of the art in...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013