A malicious node detection strategy based on fuzzy trust model and the ABC algorithm in wireless sensor network

B Pang, Z Teng, H Sun, C Du, M Li… - IEEE wireless …, 2021 - ieeexplore.ieee.org
Wireless sensor network (WSN) nodes owing to their openness, are susceptible to several
threats, one of which is dishonest recommendation attacks providing false trust values that …

A novel algorithm for improving malicious node detection effect in wireless sensor networks

H Yang, X Zhang, F Cheng - Mobile Networks and Applications, 2021 - Springer
As an important medium of information transmitting, Wireless Sensor Networks (WSN) is at
risk of a series of malicious nodes. In view of the inefficiency of the existing malicious node …

Malicious node identification strategy with environmental parameters

Z Teng, B Pang, C Du, Z Li - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless sensor network (WSN) works in a complex environment where it is difficult for
people to reach or work. The openness of nodes leads to security threats vulnerable to …

A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks

W Zhang, S Zhu, J Tang, N Xiong - The Journal of Supercomputing, 2018 - Springer
With the development of Internet technology, social network has become an important
application in the network life. However, due to the rapid increase in the number of users …

An efficient weighted trust‐based malicious node detection scheme for wireless sensor networks

F Zawaideh, M Salamah - International Journal of …, 2019 - Wiley Online Library
The aim of wireless sensor networks (WSNs) is to gather sensor data from a monitored
environment. However, the collected or reported information might be falsified by faults or …

Fuzzy trust protocol for malicious node detection in wireless sensor networks

V Ram Prabha, P Latha - Wireless Personal Communications, 2017 - Springer
Wireless sensor networks (WSNs) are used in many applications nowadays, because of its
extensive usage. Due to the distinct characteristics, they are vulnerable to many attacks. To …

BTEM: Belief based trust evaluation mechanism for wireless sensor networks

RW Anwar, A Zainal, F Outay, A Yasar… - Future generation …, 2019 - Elsevier
With the emergence of WSNs in the recent times, providing trustworthy and reliable data
delivery is challenging task due to unique characteristics and constraints of nodes. Malicious …

A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory

R Feng, X Xu, X Zhou, J Wan - Sensors, 2011 - mdpi.com
For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless
links, battlefield applications and nodes exposed to the environment without good physical …

A novel trust model of dynamic optimization based on entropy method in wireless sensor networks

S Nie - Cluster Computing, 2019 - Springer
With the continuous development of wireless sensor networks (WSNs), the existence of
malicious nodes poses a great threat to the security of the system. In traditional models …

Trust evaluation model with entropy-based weight assignment for malicious node's detection in wireless sensor networks

X Yin, S Li - EURASIP Journal on Wireless Communications and …, 2019 - Springer
Trust management is considered as an effective complementary mechanism to ensure the
security of sensor networks. Based on historical behavior, the trust value can be evaluated …