Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Detection of Wormhole Attack Via Bio-Inspired Ant Colony Optimization Based Trust Model in WSN Assisted IoT Network
Wireless Personal Communications: An International Journal (WPCO), Volume 138, Issue 3Pages 1649–1670https://doi.org/10.1007/s11277-024-11566-6AbstractWireless sensor networks are always a demanding field, no matter how technology advances in recent times. Energy efficiency and security are the major concerns for such networks. While energy efficiency has been taken care of using clustering ...
- research-articleFebruary 2024
An adaptive trust system for misbehavior detection in wireless sensor networks
Wireless Networks (WIRE), Volume 30, Issue 4Pages 2589–2615https://doi.org/10.1007/s11276-024-03687-4AbstractTrust management has been shown to be an effective technique for protecting networks from malicious nodes and ensuring wireless sensor network (WSN) security. A number of trust systems have been proposed, but most of them are not adaptative to the ...
- ArticleOctober 2023
Performance Evaluation of Global Trust Management in MANETs Routing Protocols
Computer Performance Engineering and Stochastic ModellingPages 383–397https://doi.org/10.1007/978-3-031-43185-2_26AbstractThis paper presents a comprehensive trust management strategy for MANETs, concentrating on developing, assessing, and comparing global trust management mechanisms for the Ad-hoc On-demand Distance Vector (AODV) routing protocol. The research ...
- ArticleNovember 2022
A Trust Secure Data Aggregation Model with Multiple Attributes for WSNs
Wireless Algorithms, Systems, and ApplicationsPages 526–534https://doi.org/10.1007/978-3-031-19208-1_43AbstractWireless Sensor Networks (WSNs) are composed of many resource-limited nodes which may be laid in an unattended way. As a result, the sensing data in the transmission mechanism are sensitive to attacks launched by adversaries. In this paper, we ...
- ArticleDecember 2019
A Multi-attributes-Based Trust Model of Internet of Vehicle
AbstractInternet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establish a trustworthy mechanism. Through transmission and dissemination of ...
- articleJanuary 2019
Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks
Wireless Personal Communications: An International Journal (WPCO), Volume 104, Issue 1Pages 1–20https://doi.org/10.1007/s11277-018-6005-xFor most of the tele-health applications body area networks (BANs) have become a favouring and significant technology. This application domain is exclusive so assuring security and obtaining the trustworthy details of the patients' physiological signs ...
- ArticleNovember 2018
Effective Centralized Trust Management Model for Internet of Things
Intelligent Data Engineering and Automated Learning – IDEAL 2018Pages 46–57https://doi.org/10.1007/978-3-030-03493-1_6AbstractThe emergence of the Internet of Things (IoT) is a result of convergence between multiple technologies, like Internet, wireless communication, embedded systems, microelectronic systems and nanotechnology. In 2016, 5.5 million objects are connected ...
- articleAugust 2018
Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks
Wireless Personal Communications: An International Journal (WPCO), Volume 101, Issue 4Pages 2029–2052https://doi.org/10.1007/s11277-018-5804-4The applications and protocols conceived for mobile ad hoc networks rely on the assumption of cooperation amongst the mobile nodes because of lacking infrastructure. All nodes have to spend their precious resources (e.g. battery power, memory, ...
- ArticleDecember 2010
A New Trust Management Model in P2P Systems
SITIS '10: Proceedings of the 2010 Sixth International Conference on Signal-Image Technology and Internet Based SystemsPages 241–246https://doi.org/10.1109/SITIS.2010.48The Peer-to-Peer systems (P2P) are a center of interest in the community of distributed systems, since their advantages in the adaptability and the robustness with regard to the traditional architectures client / server. Unfortunately, the anonymous and ...