원문정보
초록
영어
Mobile ad hoc networks are prone to various security attacks of malicious nodes and attackers. To protect the network clustering from security attacks, numerous trust-based clustering schemes have been presented in the literature. Analyzing the existing trust-based clustering solutions, the researchers illustrated their primary features and properties in this paper and mainly discussed about the trust management mechanisms which are integrated in each trust-based clustering solution. Besides it was illuminated how trust and reputation are used in the cluster formation and maintenance phases. At the end, all of their trust computation methods were compared and concluded with open research issues.
목차
1. Introduction
2. Cryptographic-Based Clustering
2. Trust-Based Clustering Schemes
2.1. Proposed Schemes
2.2. Cluster Management
2.3. Trust Management Systems
2.4. Security Overheads
3. Conclusion
References