An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
Performance Evaluation
A game-theoretic intrusion detection model for mobile ad hoc networks
Computer Communications
A unified framework for cluster manager election and clustering mechanism in mobile ad hoc networks
Computer Standards & Interfaces
A Survey on Trust and Reputation Schemes in Ad Hoc Networks
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
A trust model based on fuzzy recommendation for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A New Node Role-Based Reputation Model in Hierarchical Ad Hoc Networks
NCM '09 Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC
Trust Evolution Policies for Security in Collaborative Ad Hoc Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
Security and Cooperation in clustered mobile ad hoc networks with centralized supervision
IEEE Journal on Selected Areas in Communications
Review: Securing DSR against wormhole attacks in multirate ad hoc networks
Journal of Network and Computer Applications
Modified DSR protocol for detection and removal of selective black hole attack in MANET
Computers and Electrical Engineering
A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks
Computers and Electrical Engineering
Hi-index | 0.00 |
In this paper, we propose a new Routing Security Scheme based on Reputation Evaluation (RSSRE) to meet security requirements in hierarchical ad hoc networks. In this model, the reputation relationship is defined in consideration of the related node roles and functions, while the reputation evaluation mechanism is built based on the correlation among nodes that need to be evaluated. The dynamic reputation threshold is used to improve routing security with the precondition of usability. The reputation information of nodes is updated with different roles. We can reconstruct the route to solve attack problems in transmitting packets. Simulation results show that compared with traditional reputation evaluation models, the proposed model in this paper can more timely and accurately reflect security status and execute improved routing when there are malicious nodes in hierarchical Ad Hoc networks.