L Yang, Y Lu, SX Yang, T Guo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… clustering protocol in terms of number of malicious clusters, … trustevaluation method and outlier detection scheme, respectively. In Section VII, the details of our secure clusteringprotocol …
P Chatterjee - International Journal of Computer Networks and …, 2009 - academia.edu
… into clusters. In this paper we introduce a trust based approach for distributed cluster formation … We have used a quantitative trustevaluation algorithm at each node to evaluate the direct …
… In this section, we show that the proposed model based on the trustevaluation scheme along with other security scheme/architecture can handle the following attacks. While a MN …
T Zhang, L Yan, Y Yang - Wireless Networks, 2018 - Springer
… trustevaluation methods in WSNs, we found that most of them played good roles in improving security of WSNs. Even so, trustevaluation … a trustevaluation method for clustered WSNs …
L Yang, Y Lu, SX Yang, Y Zhong, T Guo… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
… Our fuzzy trustevaluation method and outlier detection scheme are presented in … clustering protocol is proposed in section VI. We verify the performance of our secure clusteringprotocol …
L Yang, Y Lu, S Liu, T Guo, Z Liang - IEEE Access, 2018 - ieeexplore.ieee.org
… Based on this game, we propose a trustevaluation scheme which is further integrated into clusteringprotocol in Section V. We evaluate the performance of our trustevaluation scheme …
ECH Ngai, MR Lyu - IEEE International Conference on Sensor …, 2006 - ieeexplore.ieee.org
… cluster is a connected sub-network usually having a relatively small diameter. We define two kinds of trust relationship in the clustered network, namely the trust … of the trustand clustering-…
T Khan, K Singh, M Abdel-Basset, HV Long… - Ieee …, 2019 - ieeexplore.ieee.org
… In LTS, punishment and trust severity can be tuned according … approach in terms of trust evaluation cost, prevention, and … For direct trustevaluation, we use the same trust computing …
… clusteringprotocol is considered to develop cluster heads from the active sensor nodes. After that, the cluster heads are evaluated using clustering, … -based routing protocol (GSTEB) Zi …