Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

Trust management in wireless sensor networks

T Zahariadis, HC Leligou, P Trakadas… - European …, 2010 - Wiley Online Library
The range of applications of wireless sensor networks is so wide that it tends to invade our
every day life. In the future, a sensor network will survey our health, our home, the roads we …

TSRF: A trust-aware secure routing framework in wireless sensor networks

J Duan, D Yang, H Zhu, S Zhang… - International Journal of …, 2014 - journals.sagepub.com
In recent years, trust-aware routing protocol plays a vital role in security of wireless sensor
networks (WSNs), which is one of the most popular network technologies for smart city …

Survey of trust models in different network domains

M Momani, S Challa - arXiv preprint arXiv:1010.0168, 2010 - arxiv.org
This paper introduces the security and trust concepts in wireless sensor networks and
explains the difference between them, stating that even though both terms are used …

A survey on trust modeling from a Bayesian perspective

B Liu - Wireless Personal Communications, 2020 - Springer
In this paper, we are concerned with trust modeling for agents in networked computing
systems. As trust is a subjective notion that is invisible, implicit and uncertain in nature, many …

E-service quality and trust on customer's patronage intention: moderation effect of adoption of advanced technologies

MS Rahman, MA Hossain, MH Zaman… - Journal of Global …, 2020 - igi-global.com
The extensive development of electronic gadgets along with technology-oriented
communication tools has created a significant impact on the realm of online retail banking …

A novel trust-aware geographical routing scheme for wireless sensor networks

T Zahariadis, P Trakadas, HC Leligou… - Wireless personal …, 2013 - Springer
Wireless sensor networks are vulnerable to a wide set of security attacks, including those
targeting the routing protocol functionality. The applicability of legacy security solutions is …

A novel approach to trust management in unattended wireless sensor networks

Y Ren, VI Zadorozhny, VA Oleshchuk… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of
disconnected operation and fixed or irregular intervals between sink visits. The absence of …

TASRP: a trust aware secure routing protocol for wireless sensor networks

T Khan, K Singh - International Journal of Innovative …, 2021 - inderscienceonline.com
Trust-based security models are efficient and reliable over traditional cryptographic schemes
(eg, encryption, key management schemes) to detect and alleviate various internal threats …

Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks

F Firoozi, VI Zadorozhny, FY Li - IEEE Sensors Journal, 2018 - ieeexplore.ieee.org
While analyzing an explosive amount of data collected in today's wireless sensor networks
(WSNs), the redundant information in the sensed data needs to be handled. In-network data …