Proceedings of the 8th International Conference on Security of Information and Networks 2015
DOI: 10.1145/2799979.2800001
|View full text |Cite
|
Sign up to set email alerts
|

Trust management system for mobile cluster-based wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Abramov and his peers implemented TMS [6]; a trust algorithm based on their previous trust model in [12]. The trust model encompasses metrics that characterize different malicious behaviors.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Abramov and his peers implemented TMS [6]; a trust algorithm based on their previous trust model in [12]. The trust model encompasses metrics that characterize different malicious behaviors.…”
Section: Related Workmentioning
confidence: 99%
“…Conversely, non-cryptographic techniques like reputation and anomaly detection systems are more concerned with isolating adversaries that are actively participating in the network. Current security research in WSNs [3], [4], [5], [6], [7] is geared towards this approach as the attacker is engaged throughout the process, constantly being faced with the challenge of survival in the network before eventually being isolated. Focusing on intrusion detection and isolation as opposed to prevention also minimizes the impact it has on the openness and flexibility of WSNs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation