Proceedings of the 2011 ACM Symposium on Applied Computing 2011
DOI: 10.1145/1982185.1982547
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical trust management for wireless sensor networks and its application to trust-based routing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 33 publications
0
14
0
Order By: Relevance
“…In [14] the authors proposed a model based on object reputation with fuzzy logic to evaluate the trust, to allow the cooperation between the objects in a wireless sensor network, part of an IoT, observing the objects behavior.In another work [15], it was proposed parameters to evaluate the social trustworthiness and the quality of service (QoS) trustworthiness, according to a hierarchical trustworthiness management protocol. On the other hand, in [16] the authors used a table to estimate the service classification to evaluate the user trustworthiness level.…”
Section: B Trustworthiness Managementmentioning
confidence: 99%
“…In [14] the authors proposed a model based on object reputation with fuzzy logic to evaluate the trust, to allow the cooperation between the objects in a wireless sensor network, part of an IoT, observing the objects behavior.In another work [15], it was proposed parameters to evaluate the social trustworthiness and the quality of service (QoS) trustworthiness, according to a hierarchical trustworthiness management protocol. On the other hand, in [16] the authors used a table to estimate the service classification to evaluate the user trustworthiness level.…”
Section: B Trustworthiness Managementmentioning
confidence: 99%
“…The authors demonstrated how the CPS applications make use of the physical information collected by a WSN to provide a connection between real and cyberspace [11]. A study on trust and reputation management system in wireless communication has been made.…”
Section: Related Workmentioning
confidence: 99%
“…To calculate ERNT, MRTS uses nodes behaviors components: selfishness, energy, and honesty. It is worth mentioning that selfishness, energy, and honesty components have been proposed in the literature in the context of clustering WSNs [5] [6]. They have been adapted by MRTS in the context of IoT (RPL).…”
Section: Introductionmentioning
confidence: 99%