A trust-based approach to mitigate rerouting attacks.
Jesus M. GonzalezMohd AnwarJames B. D. JoshiPublished in: CollaborateCom (2011)
Keyphrases
- trust model
- malicious nodes
- countermeasures
- denial of service attacks
- traffic analysis
- security protocols
- malicious users
- trust evaluation
- attack detection
- real time
- social capital
- computer security
- security risks
- watermarking algorithm
- malicious attacks
- terrorist attacks
- privacy preserving
- multi agent
- neural network
- data sets