2017
DOI: 10.1504/ijcistudies.2017.089057
|View full text |Cite
|
Sign up to set email alerts
|

Trust-based security models in wireless sensor networks: a survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…This leaves only the second option, i.e., network-level improvements to data reconstruction, as a viable one [17], [18]. The use of trust and reputation is of particular interest in wireless sensor networks [19], mobile networks in general [20], vehicular mobile networks [21], and flying ad-hoc networks [22], to name only a few areas of application.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…This leaves only the second option, i.e., network-level improvements to data reconstruction, as a viable one [17], [18]. The use of trust and reputation is of particular interest in wireless sensor networks [19], mobile networks in general [20], vehicular mobile networks [21], and flying ad-hoc networks [22], to name only a few areas of application.…”
Section: Literature Reviewmentioning
confidence: 99%
“…1) The use of reputation and reputation-based algorithms is popular. The review in [19] reported that 8 out of 20 schemes used some form of reputation, while the review in [20] recorded 16 schemes out of 48 as using reputation, and the review in [21] indicated that of 111 schemes, 63 used reputation. 2) There is no typical algorithm that is used to calculate reputation.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation