2012
DOI: 10.1109/tcomm.2012.031912.110179
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
245
0
1

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 399 publications
(246 citation statements)
references
References 29 publications
0
245
0
1
Order By: Relevance
“…In the future, we plan to demonstrate the applicability of our scalable trust management protocol with IoT applications needing trust to mitigate risk such as secure routing and intrusion detection [6,10] with fuzzy failure criteria [7] in communities of Robot as a Service (RaaS) [13] in a cloud computing environment, or in communities of associated smart phones. We also plan to investigate how to utilize community detection methods [1] to adaptively select best trust parameters in the presence of both malicious and selfish nodes.…”
Section: Discussionmentioning
confidence: 99%
“…In the future, we plan to demonstrate the applicability of our scalable trust management protocol with IoT applications needing trust to mitigate risk such as secure routing and intrusion detection [6,10] with fuzzy failure criteria [7] in communities of Robot as a Service (RaaS) [13] in a cloud computing environment, or in communities of associated smart phones. We also plan to investigate how to utilize community detection methods [1] to adaptively select best trust parameters in the presence of both malicious and selfish nodes.…”
Section: Discussionmentioning
confidence: 99%
“…Considering that the game theory is an auxiliary method for decision making rather than a prediction tool, it may not be suitable for resolving the trust problem of the sensor node. Bao et al [25] presented a hierarchical trust management protocol by formulating social trust and QoS (quality of service) trust, which regards intimacy or honesty as a metric of trust evaluation and selects QoS' trust by energy dissipation and node selfishness.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we have taken as foundation the work of Bao et al [6], which is flexible and can be adjusted by adding or removing behavioral components specific for a given application. Thus, ERNT is calculated using nodes behaviors components: selfishness, energy, and honesty, and collaboration of neighboring nodes, according to two steps: a) Direct trust evaluation: Each node i evaluates the trust value, ERNT ij (t), of its 1-hop neighbor node j at time t…”
Section: A Extended Rpl Node Trustworthiness Metricmentioning
confidence: 99%
“…w 1 , w 2 and w 3 are weights associated respectively to the three trust components: honesty, energy and unselfishness. Each component ERNT X ij (t), X ∈ {honesty; energy; unself ishness}, is evaluated according to equation 2 [6], where ∆t is the trust update interval corresponding to the DIO trickle timer; and α ∈ [0, 1] means that trust evaluation will rely more on direct or more on old observations.…”
Section: A Extended Rpl Node Trustworthiness Metricmentioning
confidence: 99%
See 1 more Smart Citation