2016 3rd International Conference on Computer and Information Sciences (ICCOINS) 2016
DOI: 10.1109/iccoins.2016.7783220
|View full text |Cite
|
Sign up to set email alerts
|

Improving security in Wireless Sensor Network using trust and metaheuristic algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Firefly algorithm low complexity among other metaheuristic algorithms has attracted much attention in the last decade [43]. The minimum computation cost of the firefly algorithm in terms of time has led to its adaptation in various applications, including digital image compression [44], antenna design [45], traveling salesman problem [46], security [47][48][49] and multi-modal optimization [50].…”
Section: Bio-inspired Based Schemesmentioning
confidence: 99%
“…Firefly algorithm low complexity among other metaheuristic algorithms has attracted much attention in the last decade [43]. The minimum computation cost of the firefly algorithm in terms of time has led to its adaptation in various applications, including digital image compression [44], antenna design [45], traveling salesman problem [46], security [47][48][49] and multi-modal optimization [50].…”
Section: Bio-inspired Based Schemesmentioning
confidence: 99%
“…Trust in vehicles can be calculated through a lightweight method and data which includes three parameters: Sensing a data consistency value (or throughput), VANET communication ability, and the Vehicle/nodes remaining lifetime. Trust assertion makes inconsistent data from DoS and SNI attacks to be detected [42].…”
Section: Node Level Securitymentioning
confidence: 99%
“…The proposed clustering behavior is conducted by two rounds, i.e., the election of CH and cluster formation. A reliable CH selection mechanism can improve the security in WSN [ 47 ]. In the first round, if a node wants to be a CH, it will send a request to its one-hop neighbors.…”
Section: The Smart Collaborative Routing Protocol For Iotmentioning
confidence: 99%