2014 Fourth International Conference of Emerging Applications of Information Technology 2014
DOI: 10.1109/eait.2014.68
|View full text |Cite
|
Sign up to set email alerts
|

Trust Aware Directed Diffusion Scheme for Wireless Sensor Networks

Abstract: Recently Wireless Sensor Networks are used in applications that are "close to human" (healthcare, context sensing etc.) as well as "close to the environment" (weather sensing, seismic activity sensing, disaster warning etc.). Many of these applications are prone to security threats. Due to lightweight processors, limited battery etc. sophisticated encryption algorithms could not be applied in such networks. Moreover, a device may change its nature in runtime. In this paper a trust management scheme is proposed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Direct observations, recommendations from others, and other factors can change a node's trust level [21] .Most of the extensions studied in this paper consider that path selection should take into consideration the trust level of and not just the number of hops. Such a trust level is not limited to the behavior of the nodes, but it's extended to other factors such as residual energy, the quality of the available channel, and the dynamic aspect of the topology [22].…”
Section: Security Analysis Discussion and Comparative Studymentioning
confidence: 99%
“…Direct observations, recommendations from others, and other factors can change a node's trust level [21] .Most of the extensions studied in this paper consider that path selection should take into consideration the trust level of and not just the number of hops. Such a trust level is not limited to the behavior of the nodes, but it's extended to other factors such as residual energy, the quality of the available channel, and the dynamic aspect of the topology [22].…”
Section: Security Analysis Discussion and Comparative Studymentioning
confidence: 99%