Availability based trust evaluation model for MANET

ABTEM was presented, an availability based trust model, and many availability oriented security service can be obtained based on this model. The performance results show that malicious nodes can be successfully discovered in accordance with its malicious acts in the routing layer when apply ABTEM on...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHAO Xi-bin1, YOU Zhi-yang1, ZHAO Zhi-feng3
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74649165/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537670943080448
author ZHAO Xi-bin1
YOU Zhi-yang1
ZHAO Zhi-feng3
author_facet ZHAO Xi-bin1
YOU Zhi-yang1
ZHAO Zhi-feng3
author_sort ZHAO Xi-bin1
collection DOAJ
description ABTEM was presented, an availability based trust model, and many availability oriented security service can be obtained based on this model. The performance results show that malicious nodes can be successfully discovered in accordance with its malicious acts in the routing layer when apply ABTEM on the DSR protocol. Furthermore malicious nodes can be isolated to protect the network from the attack of them, and which will significantly increases system avail- ability.
format Article
id doaj-art-01acaee98f8e48aa99d87b718ec0b47b
institution Kabale University
issn 1000-436X
language zho
publishDate 2010-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-01acaee98f8e48aa99d87b718ec0b47b2025-01-14T08:26:23ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-0131828874649165Availability based trust evaluation model for MANETZHAO Xi-bin1YOU Zhi-yang1ZHAO Zhi-feng3ABTEM was presented, an availability based trust model, and many availability oriented security service can be obtained based on this model. The performance results show that malicious nodes can be successfully discovered in accordance with its malicious acts in the routing layer when apply ABTEM on the DSR protocol. Furthermore malicious nodes can be isolated to protect the network from the attack of them, and which will significantly increases system avail- ability.http://www.joconline.com.cn/zh/article/74649165/mobile ad hoc networkavailabilitytrust evaluationDSR protocols
spellingShingle ZHAO Xi-bin1
YOU Zhi-yang1
ZHAO Zhi-feng3
Availability based trust evaluation model for MANET
Tongxin xuebao
mobile ad hoc network
availability
trust evaluation
DSR protocols
title Availability based trust evaluation model for MANET
title_full Availability based trust evaluation model for MANET
title_fullStr Availability based trust evaluation model for MANET
title_full_unstemmed Availability based trust evaluation model for MANET
title_short Availability based trust evaluation model for MANET
title_sort availability based trust evaluation model for manet
topic mobile ad hoc network
availability
trust evaluation
DSR protocols
url http://www.joconline.com.cn/zh/article/74649165/
work_keys_str_mv AT zhaoxibin1 availabilitybasedtrustevaluationmodelformanet
AT youzhiyang1 availabilitybasedtrustevaluationmodelformanet
AT zhaozhifeng3 availabilitybasedtrustevaluationmodelformanet