2018
DOI: 10.1016/j.comnet.2018.09.015
|View full text |Cite
|
Sign up to set email alerts
|

Trust-based secure clustering in WSN-based intelligent transportation systems

Abstract: Increasing the number of vehicles on roads leads to congestion and safety problems. Wireless Sensor Network (WSN) is a promising technology providing Intelligent Transportation Systems (ITS) to address these problems. Usually, WSN-based applications, including ITS ones, incur high communication over

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
55
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 141 publications
(55 citation statements)
references
References 21 publications
0
55
0
Order By: Relevance
“…On this basis, TOU pricing is to price the electricity selling price of different regions in different time periods. According to the peak and valley situation of the traffic flow and the working efficiency of the charging station in different periods, and considering the objectives of user benefit, operator benefit, and grid fluctuation and multiple constraints, the optimal charging price of different regions in different time periods is determined by comprehensive analysis [50]. us, we can achieve differentiated pricing strategies in different regions for different time periods.…”
Section: Case Backgroundmentioning
confidence: 99%
“…On this basis, TOU pricing is to price the electricity selling price of different regions in different time periods. According to the peak and valley situation of the traffic flow and the working efficiency of the charging station in different periods, and considering the objectives of user benefit, operator benefit, and grid fluctuation and multiple constraints, the optimal charging price of different regions in different time periods is determined by comprehensive analysis [50]. us, we can achieve differentiated pricing strategies in different regions for different time periods.…”
Section: Case Backgroundmentioning
confidence: 99%
“…The trust levels are used to identify malicious nodes. A clustering based model that uses trust factors for routing was proposed by Gaber et al [14]. This work uses the Bat Optimization Algorithm for identifying the cluster heads.…”
Section: Ajainulabudeen Mmohamed Surputheenmentioning
confidence: 99%
“…Apart from the single protocol layer attack, there is another type of attack called as cross-layer attack where multiple layers are attacked [15][16][17]. IDS plays an essential role in securing the WSN as a second wall, where it detects the misbehavior of the nodes that violates the security mechanisms [18][19][20][21][22][23]. In WSN, it is difficult to use complex security mechanisms because it increases the energy consumption of a SN.…”
Section: Introductionmentioning
confidence: 99%