2020
DOI: 10.1155/2020/2643546
|View full text |Cite
|
Sign up to set email alerts
|

Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey

Abstract: As a key component of the information sensing and aggregating for big data, cloud computing, and Internet of Things (IoT), the information security in wireless sensor network (WSN) is critical. Due to constrained resources of sensor node, WSN is becoming a vulnerable target to many security attacks. Compared to external attacks, it is more difficult to defend against internal attacks. The former can be defended by using encryption and authentication schemes. However, this is invalid for the latter, which can o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
74
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 83 publications
(74 citation statements)
references
References 88 publications
0
74
0
Order By: Relevance
“…Many scholars have made contributions to trust evaluation models and trust management schemes [29][30][31]. A complex trust evaluation model is proposed for the design of data aggregation in mobile sensor networks [32].…”
Section: Trust Evaluationmentioning
confidence: 99%
“…Many scholars have made contributions to trust evaluation models and trust management schemes [29][30][31]. A complex trust evaluation model is proposed for the design of data aggregation in mobile sensor networks [32].…”
Section: Trust Evaluationmentioning
confidence: 99%
“…The structure of this section is similar to approach as [16]. In general, studies on the trust in WSN are often summarized based on various fields such as trust model, trust management system, and protocol optimization [17]. A classification of trust-related works is provided in Fig.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Normal nodes sense environment data and transfer it to the sink. Malicious nodes are also a type of normal node that has been attacked by DoS [17].…”
Section: Network Setupmentioning
confidence: 99%
“…In wireless sensor networks, or WSNs, individual sensors are resource constraint devices with limited computing power and memory capacity, and they are usually deployed in unattended areas where adversaries could possibly physically take over a sensor and obtain the secret information stored within the sensor. However, traditional security schemes such as cryptography and authentication are mainly applied to defend against the external attacks rather than the internal ones [1]. Some studies demonstrate reputation or trust mechanism is becoming an effective approach to detect and defend against the internal attacks for WSNs [2].…”
Section: Introductionmentioning
confidence: 99%