2019
DOI: 10.1186/s13638-019-1524-z
|View full text |Cite
|
Sign up to set email alerts
|

Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks

Abstract: Trust management is considered as an effective complementary mechanism to ensure the security of sensor networks. Based on historical behavior, the trust value can be evaluated and applied to estimate the reliability of the node. For the analysis of the possible attack behavior of malicious nodes, we proposed a trust evaluation model with entropy-based weight assignment for malicious node's detection in wireless sensor networks. To mitigate the malicious attacks such as packet dropping or packet modifications,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(8 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“…A trust evaluation model based on an entropy weight assignment method is proposed in Yin & Li (2019) for the detection of malicious nodes in WSNs. The work addresses attack types related to packet dropping or packet modification by incorporating trust indicators and estimates trust values that reflect adjacent nodes behavioral information.…”
Section: Related Workmentioning
confidence: 99%
“…A trust evaluation model based on an entropy weight assignment method is proposed in Yin & Li (2019) for the detection of malicious nodes in WSNs. The work addresses attack types related to packet dropping or packet modification by incorporating trust indicators and estimates trust values that reflect adjacent nodes behavioral information.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, negative and zero value of preference function demonstrates the indifference between the decision makers visualized over the alternative pairs with respect to each criterion. In this context, a preference function selected by a decision maker resembles the form presented in Equation (5).…”
Section: Application Of M-polar Fuzzy Promethee For Estimating Cooper...mentioning
confidence: 99%
“…4 The cooperation mechanism among the mobile nodes is initiated for reliable data packets transfer in MANETs, since it does not possess a centralized controller for determining the routing path. 5 The mobile nodes that are responsible for packet transfer have the possibility of joining or leaving the network without any constraints generally resulting in an unpredictable network structure. 6 Node cooperation in MANETs with the assumption of trustworthiness is essential due to the absence of centralized administration.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Several studies have been devoted to optimization of trust computation based on different methods and theories such as game theory [17], matrix theory [14], beta distribution [16], weighting [13], and Bayesian statistics [15]. However, it is worth mentioning that all attempts of the aforementioned studies results in increasing the energy consumption and network complexity.…”
Section: Introductionmentioning
confidence: 99%