Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    Enhanced Energy Efficient with a Trust Aware in MANET for Real-Time Applications

    M. V. Narayana1, Vadla Pradeep Kumar2, Ashok Kumar Nanda2,*, Hanumantha Rao Jalla3, Subba Reddy Chavva4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 587-607, 2023, DOI:10.32604/cmc.2023.034773 - 06 February 2023

    Abstract Mobile ad hoc networks (MANETs) are subjected to attack detection for transmitting and creating new messages or existing message modifications. The attacker on another node evaluates the forging activity in the message directly or indirectly. Every node sends short packets in a MANET environment with its identifier, location on the map, and time through beacons. The attackers on the network broadcast the warning message using faked coordinates, providing the appearance of a network collision. Similarly, MANET degrades the channel utilization performance. Performance highly affects network performance through security algorithms. This paper developed a trust management… More >

  • Open Access

    ARTICLE

    Blockchain Based Consensus Algorithm and Trustworthy Evaluation of Authenticated Subgraph Queries

    G. Sharmila1,*, M. K. Kavitha Devi2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1743-1758, 2023, DOI:10.32604/csse.2023.032127 - 03 November 2022

    Abstract Over the past era, subgraph mining from a large collection of graph database is a crucial problem. In addition, scalability is another big problem due to insufficient storage. There are several security challenges associated with subgraph mining in today’s on-demand system. To address this downside, our proposed work introduces a Blockchain-based Consensus algorithm for Authenticated query search in the Large-Scale Dynamic Graphs (BCCA-LSDG). The two-fold process is handled in the proposed BCCA-LSDG: graph indexing and authenticated query search (query processing). A blockchain-based reputation system is meant to maintain the trust blockchain and cloud server of… More >

  • Open Access

    ARTICLE

    Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET

    S. Neelavathy Pari1,*, K. Sudharson2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2775-2789, 2023, DOI:10.32604/csse.2023.029345 - 01 August 2022

    Abstract A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network (MANET). A MANET’s nodes could engage actively and dynamically with one another. However, MANETs, from the other side, are exposed to severe potential threats that are difficult to counter with present security methods. As a result, several safe communication protocols designed to enhance the secure interaction among MANET nodes. In this research, we offer a reputed optimal routing value among network nodes, secure computations, and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation… More >

  • Open Access

    ARTICLE

    An Enhanced Trust-Based Secure Route Protocol for Malicious Node Detection

    S. Neelavathy Pari1,*, K. Sudharson2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2541-2554, 2023, DOI:10.32604/iasc.2023.030284 - 19 July 2022

    Abstract The protection of ad-hoc networks is becoming a severe concern because of the absence of a central authority. The intensity of the harm largely depends on the attacker’s intentions during hostile assaults. As a result, the loss of Information, power, or capacity may occur. The authors propose an Enhanced Trust-Based Secure Route Protocol (ETBSRP) using features extraction. First, the primary and secondary trust characteristics are retrieved and achieved routing using a calculation. The complete trust characteristic obtains by integrating all logical and physical trust from every node. To assure intermediate node trustworthiness, we designed an… More >

  • Open Access

    ARTICLE

    Logistic Regression Trust–A Trust Model for Internet-of-Things Using Regression Analysis

    Feslin Anish Mon Solomon1,*, Godfrey Winster Sathianesan2, R. Ramesh3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1125-1142, 2023, DOI:10.32604/csse.2023.024292 - 15 June 2022

    Abstract Internet of Things (IoT) is a popular social network in which devices are virtually connected for communicating and sharing information. This is applied greatly in business enterprises and government sectors for delivering the services to their customers, clients and citizens. But, the interaction is successful only based on the trust that each device has on another. Thus trust is very much essential for a social network. As Internet of Things have access over sensitive information, it urges to many threats that lead data management to risk. This issue is addressed by trust management that help… More >

  • Open Access

    ARTICLE

    TMTACS: Two-Tier Multi-Trust-Based Algorithm to Countermeasure the Sybil Attacks

    Meena Bharti1,*, Shaveta Rani2, Paramjeet Singh2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3497-3512, 2022, DOI:10.32604/cmc.2022.029072 - 16 June 2022

    Abstract Mobile Ad hoc Networks (MANETs) have always been vulnerable to Sybil attacks in which users create fake nodes to trick the system into thinking they’re authentic. These fake nodes need to be detected and deactivated for security reasons, to avoid harming the data collected by various applications. The MANET is an emerging field that promotes trust management among devices. Transparency is becoming more essential in the communication process, which is why clear and honest communication strategies are needed. Trust Management allows for MANET devices with different security protocols to connect. If a device finds difficulty… More >

  • Open Access

    ARTICLE

    Trust Management-Based Service Recovery and Attack Prevention in MANET

    V. Nivedita1,*, N. Nandhagopal2

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 771-786, 2021, DOI:10.32604/iasc.2021.017547 - 01 July 2021

    Abstract The mobile ad-hoc network (MANET) output is critically impaired by the versatility and resource constraint of nodes. Node mobility affects connection reliability, and node resource constraints can lead to congestion, which makes the design of a routing MANET protocol with quality of service (QoS) very difficult. An adaptive clustering reputation model (ACRM) method is proposed to improve energy efficiency with a cluster-based framework. The proposed framework is employed to overcome the problems of data protection, privacy, and policy. The proposed ACRM-MRT approach that includes direct and indirect node trust computation is introduced along with the… More >

  • Open Access

    ARTICLE

    Context and Machine Learning Based Trust Management Framework for Internet of Vehicles

    Abdul Rehman1,*, Mohd Fadzil Hassan1, Yew Kwang Hooi1, Muhammad Aasim Qureshi2, Tran Duc Chung3, Rehan Akbar4, Sohail Safdar5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4125-4142, 2021, DOI:10.32604/CMC.2021.017620 - 06 May 2021

    Abstract Trust is one of the core components of any ad hoc network security system. Trust management (TM) has always been a challenging issue in a vehicular network. One such developing network is the Internet of vehicles (IoV), which is expected to be an essential part of smart cities. IoV originated from the merger of Vehicular ad hoc networks (VANET) and the Internet of things (IoT). Security is one of the main barriers in the on-road IoV implementation. Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements. Trust plays a… More >

  • Open Access

    ARTICLE

    Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing

    Weijin Jiang1, 2, 3, Yang Wang1,*, Yirong Jiang4,*, Yuhui Xu1, Jiahui Chen1, Lina Tan1, Guo Liang5

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 123-136, 2020, DOI:10.32604/cmc.2020.05933

    Abstract In mobile cloud computing, trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud. Aiming at the security and trust management of mobile agent system in mobile cloud computing environment, the Human Trust Mechanism (HTM) is used to study the subjective trust formation, trust propagation and trust evolution law, and the subjective trust dynamic management algorithm (MASTM) is proposed. Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust More >

  • Open Access

    ARTICLE

    Quantum Communication Networks and Trust Management: A Survey

    Shibin Zhang1,*, Yan Chang1, Lili Yan1, Zhiwei Sheng1, Fan Yang1, Guihua Han1, Yuanyuan Huang1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1145-1174, 2019, DOI:10.32604/cmc.2019.05668

    Abstract This paper summarizes the state of art in quantum communication networks and trust management in recent years. As in the classical networks, trust management is the premise and foundation of quantum secure communication and cannot simply be attributed to security issues, therefore the basic and importance of trust management in quantum communication networks should be taken more seriously. Compared with other theories and techniques in quantum communication, the trust of quantum communication and trust management model in quantum communication network environment is still in its initial stage. In this paper, the core technologies of establishing More >

Displaying 1-10 on page 1 of 12. Per Page