2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes &Amp; 2017
DOI: 10.1109/it-dreps.2017.8277813
|View full text |Cite
|
Sign up to set email alerts
|

A fair trust-based malicious node detection and isolation scheme for WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…The RSFSA-ABE scheme has generated higher security performance up to 95% which is higher than the existing BTM, TAM and MATM-Fl, and UCBL-ABE schemes. 28,3032 With the adaption of polynomial functions in the selection of schemes and keys to be used, the security performance has been improved. Also, the usage of differential equations in decoding the hash code introduces higher tampering performance.…”
Section: Resultsmentioning
confidence: 99%
“…The RSFSA-ABE scheme has generated higher security performance up to 95% which is higher than the existing BTM, TAM and MATM-Fl, and UCBL-ABE schemes. 28,3032 With the adaption of polynomial functions in the selection of schemes and keys to be used, the security performance has been improved. Also, the usage of differential equations in decoding the hash code introduces higher tampering performance.…”
Section: Resultsmentioning
confidence: 99%
“…The path gain is denoted using GPx,y = 1/d s x,y for the hosts Sx and Sy. Sy is the thermal noise and BER which is based on the value of thre j is the bit error rate [14][15][16].…”
Section: Small Minimum Energy Communication Networkmentioning
confidence: 99%
“…Recently, we investigated the performance of a fair trust–based malicious node detection and isolation (FTMNDI) scheme, which periodically updates the trust of the nodes in a flat network by a neighbor‐weight trust determination algorithm. The update is based on the node's reputation and assumes a fixed trust‐update factor.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Otherwise, the node is considered a normal node and is admitted. It should be noted that MAT lies between 0 and 1, and its value depends on how sensitively the network application must quickly isolate malicious nodes in the network …”
Section: The Proposed Wt‐mnd Schemementioning
confidence: 99%