Game theory meets wireless sensor networks security requirements and threats mitigation: A survey

MS Abdalzaher, K Seddik, M Elsabrouty, O Muta… - Sensors, 2016 - mdpi.com
We present a study of using game theory for protecting wireless sensor networks (WSNs)
from selfish behavior or malicious nodes. Due to scalability, low complexity and …

Data aggregation in wireless sensor networks: from the perspective of security

X Liu, J Yu, F Li, W Lv, Y Wang… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Nodes in wireless sensor networks (WSNs) are usually deployed in an unattended even
hostile environment. What is worse, these nodes are equipped with limited battery, storage …

Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures

Y Yu, K Li, W Zhou, P Li - Journal of Network and computer Applications, 2012 - Elsevier
As the trust issue in wireless sensor networks is emerging as one important factor in security
schemes, it is necessary to analyze how to resist attacks with a trust scheme. In this paper …

A data aggregation approach exploiting spatial and temporal correlation among sensor data in wireless sensor networks

L Dash, BK Pattanayak, SK Mishra, KS Sahoo… - Electronics, 2022 - mdpi.com
Wireless sensor networks (WSNs) have various applications which include zone
surveillance, environmental monitoring, event tracking where the operation mode is long …

Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks

Z Xia, Z Wei, H Zhang - Computational Intelligence and …, 2022 - Wiley Online Library
The scale of wireless sensor networks changes depending on specific application tasks.
How to design a relatively simple security mechanism that can extend with the expansion of …

Detecting profile injection attacks in collaborative recommender systems

R Burke, B Mobasher, C Williams… - The 8th IEEE …, 2006 - ieeexplore.ieee.org
Collaborative recommender systems are known to be highly vulnerable to profile injection
attacks, attacks that involve the insertion of biased profiles into the ratings database for the …

Reputation-based trust systems for wireless sensor networks: A comprehensive review

H Alzaid, M Alfaraj, S Ries, A Jøsang… - Trust Management VII …, 2013 - Springer
Cryptographic mechanisms alone are insufficient to protect Wireless Sensor Networks
(WSNs), because sensors are deployed for long periods in hostile environments where it is …

Efficient data aggregation with in-network integrity control for WSN

M Bagaa, Y Challal, A Ouadjaout, N Lasla… - Journal of Parallel and …, 2012 - Elsevier
Energy is a scarce resource in Wireless Sensor Networks (WSN). Some studies show that
more than 70% of energy is consumed in data transmission in WSN. Since most of the time …

An area-based approach for node replica detection in wireless sensor networks

W Naruephiphat, Y Ji… - 2012 IEEE 11th …, 2012 - ieeexplore.ieee.org
Typical wireless sensor networks have restricted resources on memory capacity,
computing/processing power, and energy supply. However, wireless sensor network has …

The adoption of socio‐and bio‐inspired algorithms for trust models in wireless sensor networks: A survey

H Nunoo‐Mensah, KO Boateng… - International Journal of …, 2018 - Wiley Online Library
The security of a wireless sensor network is greatly increased with increasing levels of
trustworthiness of nodes on the network. There are a number of trust models proposed that …