2015
DOI: 10.1109/tifs.2015.2389145
|View full text |Cite
|
Sign up to set email alerts
|

Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 64 publications
(25 citation statements)
references
References 35 publications
0
25
0
Order By: Relevance
“…Successful applications include mobile ad hoc networks [26], wireless sensor networks [27], social networks [28], multi-agent networks [29] and, the most recent, anonymity networks [30,31]. These successful applications confirm the effectiveness and necessity of trust for network security.…”
Section: Related Workmentioning
confidence: 80%
“…Successful applications include mobile ad hoc networks [26], wireless sensor networks [27], social networks [28], multi-agent networks [29] and, the most recent, anonymity networks [30,31]. These successful applications confirm the effectiveness and necessity of trust for network security.…”
Section: Related Workmentioning
confidence: 80%
“…Peng Zhou et al [12] have presented a collection of optimization techniques to reduce the energy cost due to watchdog utilization by maintaining the security of the network at appropriate level.…”
Section: Related Workmentioning
confidence: 99%
“…In this work, the optimized watchdog trust system [12] for detecting the wormhole attacks is extended. Figure 2 illustrates the functional block diagram of proposed EE-IDS for detection of wormhole attack.…”
Section: Overviewmentioning
confidence: 99%
See 2 more Smart Citations