BTEM: Belief based trust evaluation mechanism for wireless sensor networks

RW Anwar, A Zainal, F Outay, A Yasar… - Future generation …, 2019 - Elsevier
With the emergence of WSNs in the recent times, providing trustworthy and reliable data
delivery is challenging task due to unique characteristics and constraints of nodes. Malicious …

Trust‐based attack and defense in wireless sensor networks: a survey

W Fang, W Zhang, W Chen, T Pan… - … and Mobile Computing, 2020 - Wiley Online Library
As a key component of the information sensing and aggregating for big data, cloud
computing, and Internet of Things (IoT), the information security in wireless sensor network …

Fuzzy trust protocol for malicious node detection in wireless sensor networks

V Ram Prabha, P Latha - Wireless Personal Communications, 2017 - Springer
Wireless sensor networks (WSNs) are used in many applications nowadays, because of its
extensive usage. Due to the distinct characteristics, they are vulnerable to many attacks. To …

Node-level trust evaluation in wireless sensor networks

SS Desai, MJ Nene - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Traditional cryptographic methods do not cater to the limitations of wireless sensor networks
(WSNs) primarily concerning code size, processing time, and power consumption. The study …

[HTML][HTML] A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory

R Feng, X Xu, X Zhou, J Wan - Sensors, 2011 - mdpi.com
For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless
links, battlefield applications and nodes exposed to the environment without good physical …

A credible Bayesian-based trust management scheme for wireless sensor networks

R Feng, X Han, Q Liu, N Yu - International Journal of …, 2015 - journals.sagepub.com
With the rapid development of wireless sensor networks (WSNs), the security of WSNs is an
important issue in this field because of their vulnerabilities to attacks. Designing a …

A novel algorithm for improving malicious node detection effect in wireless sensor networks

H Yang, X Zhang, F Cheng - Mobile Networks and Applications, 2021 - Springer
As an important medium of information transmitting, Wireless Sensor Networks (WSN) is at
risk of a series of malicious nodes. In view of the inefficiency of the existing malicious node …

[HTML][HTML] Trust evaluation model with entropy-based weight assignment for malicious node's detection in wireless sensor networks

X Yin, S Li - EURASIP Journal on Wireless Communications and …, 2019 - Springer
Trust management is considered as an effective complementary mechanism to ensure the
security of sensor networks. Based on historical behavior, the trust value can be evaluated …

An efficient dynamic trust evaluation model for wireless sensor networks

Z Ye, T Wen, Z Liu, X Song, C Fu - Journal of Sensors, 2017 - Wiley Online Library
Trust evaluation is an effective method to detect malicious nodes and ensure security in
wireless sensor networks (WSNs). In this paper, an efficient dynamic trust evaluation model …

Bayesian fusion algorithm for inferring trust in wireless sensor networks

M Momani, S Challa, R Alhmouz - Journal of networks, 2010 - opus.lib.uts.edu.au
This paper introduces a new Bayesian fusion algorithm to combine more than one trust
component (data trust and communication trust) to infer the overall trust between nodes. This …