2015
DOI: 10.1007/978-3-319-19578-0_33
|View full text |Cite
|
Sign up to set email alerts
|

On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 17 publications
0
17
0
Order By: Relevance
“…Labraoui et al proposed an On‐Off attack mitigation against trust systems (O 2 Trust) 18 . Unlike previous trust models, O 2 Trust used the punishment future as a punishment mechanism parameter, which helped to perceive malicious node that aimed to launch intelligent attacks against trust‐establishment and consequently On‐Off attack was mitigated effectively (Figure 1).…”
Section: Related Workmentioning
confidence: 99%
“…Labraoui et al proposed an On‐Off attack mitigation against trust systems (O 2 Trust) 18 . Unlike previous trust models, O 2 Trust used the punishment future as a punishment mechanism parameter, which helped to perceive malicious node that aimed to launch intelligent attacks against trust‐establishment and consequently On‐Off attack was mitigated effectively (Figure 1).…”
Section: Related Workmentioning
confidence: 99%
“…Thus, the network should allow the detection of intrusions. It is therefore necessary to design robust and lightweight algorithms for data encryption, authentication mechanisms for privacy protection, and secure routing for data relays to protect the entire network against passive and active attacks, and denials of external service providers [55,56,57]. Adaptability.…”
Section: Overview Of Wsnsmentioning
confidence: 99%
“…In addition, the initial trust value was set to 0.99 in our experiment because we used very high trust thresholds such as 0.9, and thus if the initial trust value was as low as 0.5, then most nodes would be eliminated soon after the simulation starts. For this reason, high initial trust values have been used in experiments in many studies in the literature [35,36]. We explain each experiment in detail in Section 4.2.…”
Section: • Attack Modelsmentioning
confidence: 99%