2014 IEEE International Conference on Computational Intelligence and Computing Research 2014
DOI: 10.1109/iccic.2014.7238435
|View full text |Cite
|
Sign up to set email alerts
|

Trust based secure routing protocol using fuzzy logic in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…So it is beneficial for dynamic environments. Renubala et al [83] proposed a trust scheme that calculates trust using a fuzzy approach.…”
Section: Distributed Trust Managementmentioning
confidence: 99%
“…So it is beneficial for dynamic environments. Renubala et al [83] proposed a trust scheme that calculates trust using a fuzzy approach.…”
Section: Distributed Trust Managementmentioning
confidence: 99%
“…The trust of the nodes is premeditated by N. S. Renubala and K.S.Dhanalakshmi, they aimed scheme utilizes the Bio-inspired Energy Efficient-Cluster (BEE-C) protocol and fuzzy logic [14]. The black hole and flooding attack discovered by suggested practice and it also banishes this assault.…”
Section: Related Workmentioning
confidence: 99%
“…This helps us to avoid black hole and flooding attacks. [1]. Most of the Wireless Sensor Networks (WSNs) applications are battery powered.…”
Section: Related Workmentioning
confidence: 99%