2022
DOI: 10.1155/2022/3449428
|View full text |Cite
|
Sign up to set email alerts
|

Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks

Abstract: The scale of wireless sensor networks changes depending on specific application tasks. How to design a relatively simple security mechanism that can extend with the expansion of network scale is an arduous task. As the wireless sensor network mostly adopts the decentralized organization form, once the network nodes are distributed adequately, it is difficult to find out the failure of any node. In addition, the node has weak resistance to physical damage, so any node in the network may potentially become a cau… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(19 citation statements)
references
References 47 publications
0
19
0
Order By: Relevance
“…The Lightweight Security Protocol (LSP) uses public-key cryptography to secure sensor network communication, reducing energy consumption by 60% compared to traditional public-key-based security protocols [10]. However, the LSP has limited scalability.…”
Section: Literatures Reviewmentioning
confidence: 99%
“…The Lightweight Security Protocol (LSP) uses public-key cryptography to secure sensor network communication, reducing energy consumption by 60% compared to traditional public-key-based security protocols [10]. However, the LSP has limited scalability.…”
Section: Literatures Reviewmentioning
confidence: 99%
“…Hybrid trust is a combination of direct and indirect trust mechanisms. Trust and reputation models are important for making sure that WSNs are reliable, secure, and efficient [13,31,34,35,36].…”
Section: Trust and Reputation In Wsnsmentioning
confidence: 99%
“…WSNs provide special challenges for security protocol designers due to the following unique characteristics [6,7,8,15,19,21,22,23,26,36,37,39,40,41]:…”
Section: Challenges Of Security Protocols In Wsnsmentioning
confidence: 99%
See 1 more Smart Citation
“…Ref. [60] discusses the security standards for WSNs and the current security challenges along with the importance of security in WSNs, as well as analyzes the current situation of security problems facing WSNs which includes active and passive attacks that come from internal and external sources. In addition, it discusses reputation and trust in WSNs, its history, significance, concept, and characteristics.…”
Section: Securitymentioning
confidence: 99%