ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs

T Khan, K Singh, MH Hasan, K Ahmad… - Future Generation …, 2021 - Elsevier
Trust-based secure routing schemes are more effective than cryptographic routing protocols
to convey energy-efficient data in WSNs since cryptographic protocols require high …

A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks

T Khan, K Singh, M Abdel-Basset, HV Long… - Ieee …, 2019 - ieeexplore.ieee.org
With the wide applications of wireless sensor networks (WSNs) in various fields, such as
environment monitoring, battlefield surveillance, healthcare, and intrusion detection, trust …

An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network

G Han, J Jiang, L Shu, M Guizani - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Underwater acoustic sensor networks (UASNs) have been widely used in many applications
where a variable number of sensor nodes collaborate with each other to perform monitoring …

BTEM: Belief based trust evaluation mechanism for wireless sensor networks

RW Anwar, A Zainal, F Outay, A Yasar… - Future generation …, 2019 - Elsevier
With the emergence of WSNs in the recent times, providing trustworthy and reliable data
delivery is challenging task due to unique characteristics and constraints of nodes. Malicious …

Trust evaluation method for clustered wireless sensor networks based on cloud model

T Zhang, L Yan, Y Yang - Wireless Networks, 2018 - Springer
Trust Management has been proved to be an effective method to detect malicious nodes
and ensure security in Wireless Sensor Networks (WSNs). While, most existing trust …

Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)

N Alsaedi, F Hashim, A Sali, FZ Rokhani - Computer communications, 2017 - Elsevier
Wireless sensor networks (WSNs) are an emerging technology used in many applications in
both the civilian and military domains. Typically, these networks are deployed in remote and …

ARCMT: Anchor node-based range free cooperative multi trusted secure underwater localization using fuzzifier

S Saha, R Arya - Computer Communications, 2022 - Elsevier
Secure and precise node localization is a critical challenge for the underwater acoustic
sensor network. The sensor node distribution in the aquatic environment is the most …

ETAS: an efficient trust assessment scheme for BANs

A Kumar, K Singh, T Khan, A Ahmadian… - IEEE …, 2021 - ieeexplore.ieee.org
A wireless body area network (WBAN) is a wireless network of wearable computing devices
and intelligent physiological sensors. The intelligent physiological sensors collect and …

Customizable fuzzy-neuro inference system attack detection based on trust for mobile wireless sensor networks

A Ramathilagam, K Vijayalakshmi - Wireless Personal Communications, 2024 - Springer
Abstract Wireless Sensor Networks (WSN) when simulated for implementations use Mobile
Sinks (MS) which are vulnerable to unauthorized attacks. Existing works do not ensure …

Trustworthy Event‐Information Dissemination in Vehicular Ad Hoc Networks

R Shrestha, SY Nam - Mobile Information Systems, 2017 - Wiley Online Library
In vehicular networks, trustworthiness of exchanged messages is very important since a fake
message might incur catastrophic accidents on the road. In this paper, we propose a new …