2023
DOI: 10.1016/j.tcs.2022.08.004
|View full text |Cite
|
Sign up to set email alerts
|

A trusted effective approach for forecasting the failure of data link and intrusion in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…The baseline approaches considered for comparing and validating the proposed scheme, BA1 and BA2, are a real-time forest inventory framework [10], and trusted framework for identifying intrusion or data failure [19], respetively. Srividya [19] et al have proposed a trustworthy resource reservation protocol for identifying the failure in the network. The authors have used a weighted algorithm for reducing the delay by choosing the shortest path.…”
Section: Baseline Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The baseline approaches considered for comparing and validating the proposed scheme, BA1 and BA2, are a real-time forest inventory framework [10], and trusted framework for identifying intrusion or data failure [19], respetively. Srividya [19] et al have proposed a trustworthy resource reservation protocol for identifying the failure in the network. The authors have used a weighted algorithm for reducing the delay by choosing the shortest path.…”
Section: Baseline Methodsmentioning
confidence: 99%
“…Though a number of security schemes or frameworks have been proposed by various researchers [18], [19]. However, it is very critical to ensure trust integrity and confidentiality in the network with upgraded network performance in terms of accuracy, counter cheating attack (replay attack), utility value, and delay.…”
Section: Related Workmentioning
confidence: 99%
“…In [9], they proposed a technique providing a detailed understanding of link failure. The procedure introduced the reliable Node ID-based resource reservation mechanism (PTN-RRP).…”
Section: Literary Workmentioning
confidence: 99%
“…In the same manner, link failure detection is a critical aspect in multi-hop routing. Srividya et al [116] addressed this problem by introducing a weighted trust-based end-to-end mechanism for link failure detection.…”
Section: Routing Trust Modelsmentioning
confidence: 99%