Availability based trust evaluation model for MANET
ABTEM was presented, an availability based trust model, and many availability oriented security service can be obtained based on this model. The performance results show that malicious nodes can be successfully discovered in accordance with its malicious acts in the routing layer when apply ABTEM on...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2010-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74649165/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537670943080448 |
---|---|
author | ZHAO Xi-bin1 YOU Zhi-yang1 ZHAO Zhi-feng3 |
author_facet | ZHAO Xi-bin1 YOU Zhi-yang1 ZHAO Zhi-feng3 |
author_sort | ZHAO Xi-bin1 |
collection | DOAJ |
description | ABTEM was presented, an availability based trust model, and many availability oriented security service can be obtained based on this model. The performance results show that malicious nodes can be successfully discovered in accordance with its malicious acts in the routing layer when apply ABTEM on the DSR protocol. Furthermore malicious nodes can be isolated to protect the network from the attack of them, and which will significantly increases system avail- ability. |
format | Article |
id | doaj-art-01acaee98f8e48aa99d87b718ec0b47b |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2010-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-01acaee98f8e48aa99d87b718ec0b47b2025-01-14T08:26:23ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-0131828874649165Availability based trust evaluation model for MANETZHAO Xi-bin1YOU Zhi-yang1ZHAO Zhi-feng3ABTEM was presented, an availability based trust model, and many availability oriented security service can be obtained based on this model. The performance results show that malicious nodes can be successfully discovered in accordance with its malicious acts in the routing layer when apply ABTEM on the DSR protocol. Furthermore malicious nodes can be isolated to protect the network from the attack of them, and which will significantly increases system avail- ability.http://www.joconline.com.cn/zh/article/74649165/mobile ad hoc networkavailabilitytrust evaluationDSR protocols |
spellingShingle | ZHAO Xi-bin1 YOU Zhi-yang1 ZHAO Zhi-feng3 Availability based trust evaluation model for MANET Tongxin xuebao mobile ad hoc network availability trust evaluation DSR protocols |
title | Availability based trust evaluation model for MANET |
title_full | Availability based trust evaluation model for MANET |
title_fullStr | Availability based trust evaluation model for MANET |
title_full_unstemmed | Availability based trust evaluation model for MANET |
title_short | Availability based trust evaluation model for MANET |
title_sort | availability based trust evaluation model for manet |
topic | mobile ad hoc network availability trust evaluation DSR protocols |
url | http://www.joconline.com.cn/zh/article/74649165/ |
work_keys_str_mv | AT zhaoxibin1 availabilitybasedtrustevaluationmodelformanet AT youzhiyang1 availabilitybasedtrustevaluationmodelformanet AT zhaozhifeng3 availabilitybasedtrustevaluationmodelformanet |