2016
DOI: 10.1007/s11277-016-3349-y
|View full text |Cite
|
Sign up to set email alerts
|

An Energy Aware Trust Based Intrusion Detection System with Adaptive Acknowledgement for Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
25
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(26 citation statements)
references
References 24 publications
1
25
0
Order By: Relevance
“…PROVEnance‐based Trust model (PROVEST) was introduced by Cho and Chen, where the route dynamically changes and in the presence of the malicious nodes, the trust of the node is evaluated. According to the Trust‐Based Adaptive Acknowledgment (TRAACK) protocol proposed by Rajeshkumar and Valluvan, acknowledgment is initiated on the chosen packets based on the trust value of the entire route. Here the intermediate nodes forward the packet to the destination.…”
Section: Literature Reviewmentioning
confidence: 99%
“…PROVEnance‐based Trust model (PROVEST) was introduced by Cho and Chen, where the route dynamically changes and in the presence of the malicious nodes, the trust of the node is evaluated. According to the Trust‐Based Adaptive Acknowledgment (TRAACK) protocol proposed by Rajeshkumar and Valluvan, acknowledgment is initiated on the chosen packets based on the trust value of the entire route. Here the intermediate nodes forward the packet to the destination.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Zhang et al [46] proposed a trust model based on cloud model for clustered WSN. Rajeshkumar et al [47] proposed an adaptive trust-based acknowledgment IDS using active successful deliveries. In this method, Kalman filter is used to estimate the trust factor of a node.…”
Section: Related Workmentioning
confidence: 99%
“…In [ 36 , 37 ], some new models are used to evaluate the trustworthiness. Zhang et al [ 36 ] put forward a trust evaluation method for clustered wireless sensor networks based on cloud model, which implements the conversion between qualitative and quantitative of trust metrics and produces different types of trust cloud to evaluate trust values of cluster heads and cluster members.…”
Section: Related Workmentioning
confidence: 99%
“…The focus of this paper is on anomaly detection schemes. Recently, different types of anomaly detection schemes based on traffic prediction [ 15 ], statistical method [ 16 ], data mining [ 17 ], game theory [ 18 , 19 , 20 ], immune theory [ 21 ], or trust management [ 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 ], etc., have been proposed.…”
Section: Introductionmentioning
confidence: 99%