Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems
DOI: 10.1109/dssns.2006.1
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
77
0
5

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 106 publications
(82 citation statements)
references
References 23 publications
0
77
0
5
Order By: Relevance
“…For example, in the LCC algorithm [10] re-clustering is initiated when two cluster heads come in range and in [11] lower overhead than LCC is demonstrated if the cluster head change is deferred for a period of time which depends on the speed of the two moving cluster heads that meet. We assume here that re-clustering is initiated by the current local CH when its energy drops below a specific threshold value [12]. In that case the following actions are taken place:…”
Section: B New Cluster Head Selection With Votingmentioning
confidence: 99%
“…For example, in the LCC algorithm [10] re-clustering is initiated when two cluster heads come in range and in [11] lower overhead than LCC is demonstrated if the cluster head change is deferred for a period of time which depends on the speed of the two moving cluster heads that meet. We assume here that re-clustering is initiated by the current local CH when its energy drops below a specific threshold value [12]. In that case the following actions are taken place:…”
Section: B New Cluster Head Selection With Votingmentioning
confidence: 99%
“…One notable exception to date has been the inclusion of the "trustworthiness" of a public key infrastructure (PKI) schemebased certificate in MANET decision-making [4].…”
Section: Mobile Ad-hoc Network (Manets)mentioning
confidence: 99%
“…Networked devices must rely on their peers to pass messages and to gain services that the component devices require in the day-to-day operation of the MANET. Decisions made for the collective good of the network are made in areas such as network clustering (the grouping of nodes) [2,3,5], cluster-head selection [2,3,4], protocol selection [6,7,8], and security policy. MANET decision-making does not end with providing the network with its initial organization.…”
Section: Mobile Ad-hoc Network (Manets)mentioning
confidence: 99%
See 1 more Smart Citation
“…In (Tanachaiwiwat, Dave, Bhindwale and Helmy, 2003;Yao, Kim, Lee, Kim and Jang, 2005) authors define reputation metrics related to cryptographic operation, availability of nodes to provide service, and nodes behaviour that can indicate malicious activity. In (Crosby, Pissinou and Gadze, 2006), authors follow a similar trust evaluation approach to aid the election of trustworthy cluster heads. Another approach is taken by (Liu, Abu-Ghazaleh and Kang, 2007) where they not only favour well behaving nodes for each successful packet forwarding, but also penalize suspicious nodes that lie about their contribution to routing.…”
Section: Reputation -Based Trust Managementmentioning
confidence: 99%