2012
DOI: 10.1007/s11277-012-0613-7
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
76
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(76 citation statements)
references
References 14 publications
0
76
0
Order By: Relevance
“…A node's behavior can be understood by evaluating past performance [22,23]. Suppose that a node that is doing a positive action has a negative past in the past and can always assume that it behaves negatively in a reliable pathway.…”
Section: Role Of Node Behavior For Trust Changesmentioning
confidence: 99%
See 2 more Smart Citations
“…A node's behavior can be understood by evaluating past performance [22,23]. Suppose that a node that is doing a positive action has a negative past in the past and can always assume that it behaves negatively in a reliable pathway.…”
Section: Role Of Node Behavior For Trust Changesmentioning
confidence: 99%
“…Many studies are performed in the consideration of trust for providing wireless network security [2,6,10,12,23,24]. A neighboring node behavior monitoring approach for trust evaluation through a direct observation procedures is proposed in [25].…”
Section: Trust-based Security Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Theodore Zahariadis.et.al [15]: In this paper, authors proposed a secure routing protocol that works with dimensions of network and depended on trusted models for the purpose of withdrawing and discovering of malicious neighbours. For evaluating the performance, authors have used JSIM as a simulation tool.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Though, the context-aware technique detecting the selfish nodes effectively, it uses a digital signature for disseminating information to intimate about the malicious nodes. An approach in [13] proposes a secure routing protocol that follows a distributed trust model and geographical routing strategy. The routing decision is taken based on the location, trust, and energy information.…”
Section: Literature Surveymentioning
confidence: 99%