Trust‐based attack and defense in wireless sensor networks: a survey

W Fang, W Zhang, W Chen, T Pan… - … and Mobile Computing, 2020 - Wiley Online Library
As a key component of the information sensing and aggregating for big data, cloud
computing, and Internet of Things (IoT), the information security in wireless sensor network …

SVELTE: Real-time intrusion detection in the Internet of Things

S Raza, L Wallgren, T Voigt - Ad hoc networks, 2013 - Elsevier
Abstract In the Internet of Things (IoT), resource-constrained things are connected to the
unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are …

Detecting malicious data injections in wireless sensor networks: A survey

VP Illiano, EC Lupu - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Wireless Sensor Networks are widely advocated to monitor environmental parameters,
structural integrity of the built environment and use of urban spaces, services and utilities …

[HTML][HTML] Management and applications of trust in Wireless Sensor Networks: A survey

G Han, J Jiang, L Shu, J Niu, HC Chao - Journal of Computer and System …, 2014 - Elsevier
Abstract Wireless Sensors Networks (WSNs) are susceptible to many security threats, and
because of communication, computation and delay constraints of WSNs, traditional security …

A survey of trust and reputation management systems in wireless communications

H Yu, Z Shen, C Miao, C Leung… - Proceedings of the …, 2010 - ieeexplore.ieee.org
Trust is an important concept in human interactions which facilitates the formation and
continued existence of functional human societies. In the first decade of the 21st century …

Trust management in wireless sensor networks

T Zahariadis, HC Leligou, P Trakadas… - European …, 2010 - Wiley Online Library
The range of applications of wireless sensor networks is so wide that it tends to invade our
every day life. In the future, a sensor network will survey our health, our home, the roads we …

[PDF][PDF] The probabilistic approach of energy utility and reusability model with enhanced security from the compromised nodes through wireless energy transfer in WSN

M Poongodi, IF Al-Shaikhli, V Vijayakumar - Int. J. Pure Appl. Math, 2017 - researchgate.net
The wireless sensor network is a contemporary technology in military surveillance to reduce
the uncertainty in the battle field. Due to the nature of its limited resources and deployment in …

Multipath routing techniques in wireless sensor networks: A survey

K Sha, J Gehlot, R Greve - Wireless personal communications, 2013 - Springer
Multipath routing is an efficient technique to route data in wireless sensor networks (WSNs)
because it can provide reliability, security and load balance, which are especially critical in …

Detecting and identifying faulty IoT devices in smart home with context extraction

J Choi, H Jeoung, J Kim, Y Ko, W Jung… - 2018 48th annual …, 2018 - ieeexplore.ieee.org
A fast and reliable method to detect faulty IoT devices is indispensable in IoT environments.
In this paper, we present DICE, an automatic method to detect and identify faulty IoT devices …

A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks

W Zhang, S Zhu, J Tang, N Xiong - The Journal of Supercomputing, 2018 - Springer
With the development of Internet technology, social network has become an important
application in the network life. However, due to the rapid increase in the number of users …