H Yang, X Zhang, F Cheng - Mobile Networks and Applications, 2021 - Springer
As an important medium of information transmitting, Wireless Sensor Networks (WSN) is at risk of a series of malicious nodes. In view of the inefficiency of the existing malicious node …
Z Teng, B Pang, C Du, Z Li - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless sensor network (WSN) works in a complex environment where it is difficult for people to reach or work. The openness of nodes leads to security threats vulnerable to …
W Zhang, S Zhu, J Tang, N Xiong - The Journal of Supercomputing, 2018 - Springer
With the development of Internet technology, social network has become an important application in the network life. However, due to the rapid increase in the number of users …
F Zawaideh, M Salamah - International Journal of …, 2019 - Wiley Online Library
The aim of wireless sensor networks (WSNs) is to gather sensor data from a monitored environment. However, the collected or reported information might be falsified by faults or …
V Ram Prabha, P Latha - Wireless Personal Communications, 2017 - Springer
Wireless sensor networks (WSNs) are used in many applications nowadays, because of its extensive usage. Due to the distinct characteristics, they are vulnerable to many attacks. To …
With the emergence of WSNs in the recent times, providing trustworthy and reliable data delivery is challenging task due to unique characteristics and constraints of nodes. Malicious …
R Feng, X Xu, X Zhou, J Wan - Sensors, 2011 - mdpi.com
For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical …
With the continuous development of wireless sensor networks (WSNs), the existence of malicious nodes poses a great threat to the security of the system. In traditional models …
X Yin, S Li - EURASIP Journal on Wireless Communications and …, 2019 - Springer
Trust management is considered as an effective complementary mechanism to ensure the security of sensor networks. Based on historical behavior, the trust value can be evaluated …