2022
DOI: 10.1109/jiot.2021.3102578
|View full text |Cite
|
Sign up to set email alerts
|

Securing Software-Defined WSNs Communication via Trust Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…Malicious nodes can lower the network's availability because of in-band communications and the fact that SDWSNs inherently lack secure channels. To aid in the identification of hazards within SDWSNs, the encouragement of node collaboration, and the facilitation of forwarding choices, Bin-Yahya et al [7] suggested a hierarchical trust management strategy for SDWSNs. Over the numerous levels of the SDWSN architecture, TSW establishes the dependability of the participating nodes and makes it possible to detect malicious behaviors.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Malicious nodes can lower the network's availability because of in-band communications and the fact that SDWSNs inherently lack secure channels. To aid in the identification of hazards within SDWSNs, the encouragement of node collaboration, and the facilitation of forwarding choices, Bin-Yahya et al [7] suggested a hierarchical trust management strategy for SDWSNs. Over the numerous levels of the SDWSN architecture, TSW establishes the dependability of the participating nodes and makes it possible to detect malicious behaviors.…”
Section: Literature Surveymentioning
confidence: 99%
“…With Software Defined Networking (SDN), which provides a bird's-eye view of the network, centralized control, and adjustable forwarding rules, this kind of dynamic and flexible network administration is made feasible. 6G networks are notoriously complicated, therefore researchers are looking to AI, SDN, and quantum computing to solve some of the most intractable problems, such optimising routing in these networks [7].…”
Section: Introductionmentioning
confidence: 99%
“…Trust management has been extensively explored and utilized in Internet of Things (IoT) systems. 31 Among these, work on trust management in the IOVs is a hot topic with the potential to significantly speed up the development of ICVs by improving their security protection level. 32 The major issues of trust management in IoVs are efficient, low-latency, and heterogeneous trust evaluation and aggregations to the high dynamic nodes in IoVs.…”
Section: Related Workmentioning
confidence: 99%
“…Trust management has been extensively explored and utilized in Internet of Things (IoT) systems 31 . Among these, work on trust management in the IOVs is a hot topic with the potential to significantly speed up the development of ICVs by improving their security protection level 32 .…”
Section: Related Workmentioning
confidence: 99%