A secure clustering in MANET through direct trust evaluation technique

K Gomathi, B Parvathavarthini - 2015 International Conference …, 2015 - ieeexplore.ieee.org
… on trust value. The trustworthiness of the node is evaluated by direct trust evaluation technique
and the trust … The sub group(cluster) security is ensured by electing trustworthy node as …

A secure clustering protocol with fuzzy trust evaluation and outlier detection for industrial wireless sensor networks

L Yang, Y Lu, SX Yang, T Guo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
clustering protocol in terms of number of malicious clusters, … trust evaluation method and
outlier detection scheme, respectively. In Section VII, the details of our secure clustering protocol

[PDF][PDF] Trust based clustering and secure routing scheme for mobile ad hoc networks

P Chatterjee - International Journal of Computer Networks and …, 2009 - academia.edu
… into clusters. In this paper we introduce a trust based approach for distributed cluster formation
… We have used a quantitative trust evaluation algorithm at each node to evaluate the direct …

A trust enhanced secure clustering framework for wireless ad hoc networks

P Chatterjee, U Ghosh, I Sengupta, SK Ghosh - Wireless networks, 2014 - Springer
… In this section, we show that the proposed model based on the trust evaluation scheme
along with other security scheme/architecture can handle the following attacks. While a MN …

Trust evaluation method for clustered wireless sensor networks based on cloud model

T Zhang, L Yan, Y Yang - Wireless Networks, 2018 - Springer
trust evaluation methods in WSNs, we found that most of them played good roles in improving
security of WSNs. Even so, trust evaluation … a trust evaluation method for clustered WSNs …

An evolutionary game-based secure clustering protocol with fuzzy trust evaluation and outlier detection for wireless sensor networks

L Yang, Y Lu, SX Yang, Y Zhong, T Guo… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
… Our fuzzy trust evaluation method and outlier detection scheme are presented in … clustering
protocol is proposed in section VI. We verify the performance of our secure clustering protocol

A dynamic behavior monitoring game-based trust evaluation scheme for clustering in wireless sensor networks

L Yang, Y Lu, S Liu, T Guo, Z Liang - IEEE Access, 2018 - ieeexplore.ieee.org
… Based on this game, we propose a trust evaluation scheme which is further integrated into
clustering protocol in Section V. We evaluate the performance of our trust evaluation scheme …

An authentication service based on trust and clustering in wireless ad hoc networks: description and security evaluation

ECH Ngai, MR Lyu - IEEE International Conference on Sensor …, 2006 - ieeexplore.ieee.org
cluster is a connected sub-network usually having a relatively small diameter. We define two
kinds of trust relationship in the clustered network, namely the trust … of the trustand clustering-…

A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks

T Khan, K Singh, M Abdel-Basset, HV Long… - Ieee …, 2019 - ieeexplore.ieee.org
… In LTS, punishment and trust severity can be tuned according … approach in terms of trust
evaluation cost, prevention, and … For direct trust evaluation, we use the same trust computing …

[PDF][PDF] Hybrid Soft Computing Technique Based Trust Evaluation Protocol for Wireless Sensor Networks.

S Kaur, VK Joshi - Intelligent Automation & Soft Computing, 2020 - cdn.techscience.cn
clustering protocol is considered to develop cluster heads from the active sensor nodes. After
that, the cluster heads are evaluated using clustering, … -based routing protocol (GSTEB) Zi …