2022
DOI: 10.1109/access.2021.3075959
|View full text |Cite
|
Sign up to set email alerts
|

Trust Based Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 50 publications
(24 citation statements)
references
References 38 publications
0
13
0
Order By: Relevance
“…Therefore, it is important to consider the energy consumption while enhancing the security of the network to avoid rapid energy depletion of the nodes. In this paper, we use a similar energy model as used in [30], [34]. The energy consumed by node i to send s-bits of data to node j at a distance d is as follows:…”
Section: Energy Modelmentioning
confidence: 99%
“…Therefore, it is important to consider the energy consumption while enhancing the security of the network to avoid rapid energy depletion of the nodes. In this paper, we use a similar energy model as used in [30], [34]. The energy consumed by node i to send s-bits of data to node j at a distance d is as follows:…”
Section: Energy Modelmentioning
confidence: 99%
“…Wang et al [ 16 ] proposed a trust evaluation scheme based on mobile edge nodes for IoT. In [ 17 ], the authors propose a routing protocol called trust-based secure and energy (TBSEER) routing protocol to resolve the congestion and serious energy dissipation problems. In this proposal, the nodes calculate the adaptive direct trust value, and the sink nodes take care of indirect trust computation.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, the performance of the proposed TARM is verified in the MATLAB software (8 GB RAM, i7 core CPU Windows 10 system) and is validated with other similar latest trust-based models that employ edge nodes such as ITCM [ 18 ], TBSEER [ 17 ], VFDC [ 10 ], TEC-SFS [ 33 ], and TEM-MEN [ 16 ]. Deployment of the sensor nodes in the network is considered according to Sah et al [ 34 ].…”
Section: Performance Evaluationmentioning
confidence: 99%
“…It is very difficult to provide the trust [47] all over the network in harsh environment. Also, there exist a chance for the attackers to compromise both the network owner [57] and network user which causes conflict of interest during data dissemination.…”
Section: Introductionmentioning
confidence: 99%