2020
DOI: 10.1016/j.adhoc.2020.102215
|View full text |Cite
|
Sign up to set email alerts
|

Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
77
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 59 publications
(77 citation statements)
references
References 23 publications
0
77
0
Order By: Relevance
“…As in references [38][39][40], nodes identify malicious nodes by calculating trust values. How to improve the trust value of normal nodes and quickly reduce the trust value of malicious nodes is the key to protecting routing.…”
Section: Trust Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…As in references [38][39][40], nodes identify malicious nodes by calculating trust values. How to improve the trust value of normal nodes and quickly reduce the trust value of malicious nodes is the key to protecting routing.…”
Section: Trust Modelmentioning
confidence: 99%
“…In order to guarantee the routing security of wireless sensor networks, many researchers have proposed kinds of secure routing protocols based on cryptography and authentication [13][14][15][16]. However, the security mechanism based on cryptography and identity verification is not appropriate to deal with improper behavior attacks of nodes [17,18]. Because the premise of implementing these security mechanisms is that all nodes are cooperative and trustworthy, which is unrealistic for internal attacks on the network [19,20].…”
Section: Introductionmentioning
confidence: 99%
“…This paper uses the simplified beta trust model to calculate the trust value. The trust evaluation model adopts the model of previous research work [26], which is expressed as…”
Section: A Multicluster Trust Schemementioning
confidence: 99%
“…Similarly, in WRSNs, Shafie et al [10] and Bhushan et al [11] propose a novel efficient scheme and Energy Efficient Secured Ring Routing (E2SR2) protocols, respectively, in order to enhance the security performance of WRSNs. Besides, as the key hub of DTLs, security on a cluster head draws academic attention [12,13].…”
Section: Related Workmentioning
confidence: 99%