2011
DOI: 10.4304/jnw.6.2.295-302
|View full text |Cite
|
Sign up to set email alerts
|

Trust Based Secure In-network Data Processing Schema in Wireless Sensor Networks

Abstract: In wireless sensor networks, in-network data processing plays an important role to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…For example, regarding the reputation fusion, some literatures such as [21,24,26,29,35,36] use both direct reputation and indirect reputation, while others like [30,31,33,41,42,43] only apply direct reputation. For another example, as is shown in Table 1, on the reputation aging, among the literatures that apply direct reputation and/or indirect reputation, only a few of them such as [21,24,25,33] use the reputation aging, while other literatures ignore it for no reason. Besides, by using the concept of binomial reputation, energy reputation [36,37], communication reputation [25,34,35,36,37], and data reputation like [30,34,41,42,59] and so on are introduced so as to save individual node energy and ensure the reliable communication and data transmission.…”
Section: Reputation Agingmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, regarding the reputation fusion, some literatures such as [21,24,26,29,35,36] use both direct reputation and indirect reputation, while others like [30,31,33,41,42,43] only apply direct reputation. For another example, as is shown in Table 1, on the reputation aging, among the literatures that apply direct reputation and/or indirect reputation, only a few of them such as [21,24,25,33] use the reputation aging, while other literatures ignore it for no reason. Besides, by using the concept of binomial reputation, energy reputation [36,37], communication reputation [25,34,35,36,37], and data reputation like [30,34,41,42,59] and so on are introduced so as to save individual node energy and ensure the reliable communication and data transmission.…”
Section: Reputation Agingmentioning
confidence: 99%
“…For another example, as is shown in Table 1, on the reputation aging, among the literatures that apply direct reputation and/or indirect reputation, only a few of them such as [21,24,25,33] use the reputation aging, while other literatures ignore it for no reason. Besides, by using the concept of binomial reputation, energy reputation [36,37], communication reputation [25,34,35,36,37], and data reputation like [30,34,41,42,59] and so on are introduced so as to save individual node energy and ensure the reliable communication and data transmission. Further, penalty and reward mechanisms [43], light computational complexity such as [21,24,26,27], and energy issues like [43,44,76] and so on are also considered in order to stimulate node cooperation, avoid running complex algorithms, and balance the energy consumed in the network.…”
Section: Reputation Agingmentioning
confidence: 99%
“…The interference over node is got from the Beacons sent by neighbors. We assume that antennas can detect the signal power sending from neighbors and the distance can be derived with some simple calculations according to the Equation (2) and (3).…”
Section: B Data Processingmentioning
confidence: 99%
“…We generate 5 to 25 CBR multihop flows. The flow weights are randomly assigned in the range of [1,3]. The sources and destinations of these flows are randomly selected.…”
Section: A System Setupmentioning
confidence: 99%
See 1 more Smart Citation