2019
DOI: 10.1109/access.2019.2914769
|View full text |Cite
|
Sign up to set email alerts
|

A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks

Abstract: With the wide applications of wireless sensor networks (WSNs) in various fields, such as environment monitoring, battlefield surveillance, healthcare, and intrusion detection, trust establishment among sensor nodes becomes a vital requirement to improve security, reliability, and successful cooperation. The existing trust management approaches for large-scale WSN are failed due to their low dependability (i.e., cooperation), higher communication, and memory overheads (i.e., resource inefficient). In this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
53
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 109 publications
(53 citation statements)
references
References 127 publications
0
53
0
Order By: Relevance
“…Khan et al [71] proposed a trust estimate method for a bulky sensor network. WSN retain grouping to recover cooperativeness, honesty, and security by detecting faulty nodes and reduce resource consumption.…”
Section: Centralized Trust Management Schemesmentioning
confidence: 99%
“…Khan et al [71] proposed a trust estimate method for a bulky sensor network. WSN retain grouping to recover cooperativeness, honesty, and security by detecting faulty nodes and reduce resource consumption.…”
Section: Centralized Trust Management Schemesmentioning
confidence: 99%
“…However, the system performance is limited with ETRES, which may decrease the security level. For large-scale wireless sensor networks, Ref [ 23 ] proposed a novel trust estimation approach with clustering to improve cooperation, trustworthiness, and security with less memory and power consumption. The design of two levels of clusters makes the minimum overheads.…”
Section: Related Workmentioning
confidence: 99%
“…where denotes the Hadamard product. In this paper, the variables and constants involved in each subsystem (5) are represented by the same fixed-point scheme with the same β bits for the fraction part. Assuming that all uncertainties |∆ ij | also have the common bound 2 −(β+1) , and it can be obtained that…”
Section: A Network and Fwl Effectsmentioning
confidence: 99%
“…The problem under consideration can be paraphrased as finding an appropriate equivalent realization for (5) which is resilient to FWL effects using the fixed-point representation and designing the corresponding estimator gain to guarantee the estimator's stability, which is summarized as the following Problem 1. Problem 1: For given word length β for the coefficients' representation and network X with internal time delay τ ij , i, j = 1, 2, • • • ,n, find an appropriate realization for system (5) and design the estimator to be stable after implementation.…”
Section: B Problem Definitionmentioning
confidence: 99%
See 1 more Smart Citation