2019
DOI: 10.1007/s11276-019-02129-w
|View full text |Cite
|
Sign up to set email alerts
|

TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
43
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 77 publications
(43 citation statements)
references
References 32 publications
0
43
0
Order By: Relevance
“…Based on historical behavior, evaluating the trust value of a node can estimate its trustworthiness to perform a particular task. Currently, the research on trust decision based on trust value mainly includes two aspects: one is the detection of malicious nodes and the defense against internal attacks, especially, defending against the On‐Off attack, and the other is to select the next hop node and to improve the security of routing protocol 10 . In this section, we will discuss and analyze the above‐mentioned two aspects.…”
Section: Related Workmentioning
confidence: 99%
“…Based on historical behavior, evaluating the trust value of a node can estimate its trustworthiness to perform a particular task. Currently, the research on trust decision based on trust value mainly includes two aspects: one is the detection of malicious nodes and the defense against internal attacks, especially, defending against the On‐Off attack, and the other is to select the next hop node and to improve the security of routing protocol 10 . In this section, we will discuss and analyze the above‐mentioned two aspects.…”
Section: Related Workmentioning
confidence: 99%
“…A Gaussian distribution‐based comprehensive trust management system was introduced in Reference 24. But, attack detection was not effectively performed in Reference 25 a fountain‐coding aided strategy utilized to ensure secure transmission based on cooperative model in industrial wireless sensor networks.…”
Section: Related Workmentioning
confidence: 99%
“…In [15], researchers have proposed a dynamic trust framework to detect selfish and malicious nodes, and the entire network utility has been improved. Not only for the network, but the routing protocols also improve their security due to the introduction of trust [21]. Table 2.…”
Section: Trust Model Trust Mechanism and Trust Framework In Networkmentioning
confidence: 99%
“…These attacks can disrupt the transmission link of the network, which in turn disrupts network availability. How to choose a reliable node for transmission, and how to isolate malicious nodes out from the network quickly and accurately, are crucial [21][22][23]. To find the optimal choice in distributed network, game theory is an effective solution [24][25][26].…”
Section: Introductionmentioning
confidence: 99%