2014 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applicati 2014
DOI: 10.1109/civemsa.2014.6841440
|View full text |Cite
|
Sign up to set email alerts
|

A security model for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Research conducted by Marzi and Marzi [10] propose a security model for WSN using trust and reputation models (TRM). The issues highlighted by the authors emphasise the security vulnerabilities incurred by incorporating WSN into a networked environment (e.g.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Research conducted by Marzi and Marzi [10] propose a security model for WSN using trust and reputation models (TRM). The issues highlighted by the authors emphasise the security vulnerabilities incurred by incorporating WSN into a networked environment (e.g.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In literature, they are many ways have been followed to classify WSN attacks such as active vs. passive, insider vs. external and layer-based classification. Marzi and Marzi [10], classified the attacks into (5) classes that include wormholes, selective forwarding, Sybil, sinkhole, and HELLO flood attacks.…”
Section: Wsn Attacks Classificationmentioning
confidence: 99%
“…Marzi and Marzi [10] proposed an Enhanced bio-inspired trust and reputation system, EBTRM. Their proposed system is inspired by the existing approaches: (i) Peer Trust system and (ii) Bio inspired Trust and Reputation System BTRM-WSN.…”
Section: Layer-based Classificationmentioning
confidence: 99%
“…The aim was to establish a safe Wireless Sensor Networks without damaging the network, by the good management of resources specially the energy. Hosein, M. and Arash, M., [14] have investigated security in Wireless Sensor Networks (WSNs) and presented a design process for achieving optimum security based on requirements and constraints in WSNs. WSN protocols focused on energy efficiency, transmission efficiency and routing.…”
Section: 1mentioning
confidence: 99%