2019 International Conference on Electrical, Computer and Communication Engineering (ECCE) 2019
DOI: 10.1109/ecace.2019.8679165
|View full text |Cite
|
Sign up to set email alerts
|

ANFIS based Trust Management Model to Enhance Location Privacy in Underwater Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…A large percentage of the primary studies are focused on addressing a particular threat or group of attacks, proposing new algorithms 17,37,46 and security models. 30,44,49 The other papers are focused on demonstration and classification of attacks and threats, such as DoS, localization and routing attacks, 26,27,32 as well as presenting security issues and key research challenges. 13,16,23 These studies are mostly evaluated using simulations.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…A large percentage of the primary studies are focused on addressing a particular threat or group of attacks, proposing new algorithms 17,37,46 and security models. 30,44,49 The other papers are focused on demonstration and classification of attacks and threats, such as DoS, localization and routing attacks, 26,27,32 as well as presenting security issues and key research challenges. 13,16,23 These studies are mostly evaluated using simulations.…”
Section: Discussionmentioning
confidence: 99%
“…Trust management: A trust cloud model for UWSNs is proposed by Jiang et al 42 for malicious node detection, trust value calculation and data transmission. Also, Arifeen et al 44 propose a trust management model for location privacy. It utilizes Adaptive Neuro Fuzzy Inference System to asses node trustworthiness and Markov Decision Process to select trusted nodes.…”
Section: Rq3: What Are the Methods Available To Overcome The Challengmentioning
confidence: 99%
See 1 more Smart Citation
“…3 [78,321,322] Papers discussing trust management in UIoT networks. 19 [273,275,276,314,[323][324][325][326][327][328][329][330][331][332][333][334][335][336][337] Figure 15. Results based on the systematic analysis of security attacks and management.…”
Section: Q4: What Are the Findings Based On The Existing Research Work?mentioning
confidence: 99%
“…Therefore, in recent years, UWSNs have been used to collect various underwater data to achieve many goals (such as pollution monitoring, disaster prevention, flood monitoring, oceanographic research, oil pipeline monitoring, mineral exploration, military surveillance, etc.) [ 2 , 3 ].…”
Section: Introductionmentioning
confidence: 99%