A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management
2022
Wireless Communications and Mobile Computing
paper proposes a secure routing protocol for wireless sensor networks based on trust management. ...
For the trust management-based wireless sensor network security routing protocol proposed in this paper, the model included in the protocol is compared to the existing security routing model, combining ...
TSRI is a trust assumption and trust-based resource routing protocol. ...
doi:10.1155/2022/5955543
fatcat:v7yextergjd7jfn2s6xgeliqt4
A Trust Calculation Algorithm for Communicating Nodes in Wireless Sensor Networks
2021
International Research Journal on Advanced Science Hub
In various areas of the communication system, work based on Wireless Sensor Network (WSN) is being used these days. ...
In this paper, we propose Trust Calculation Algorithm for communicating nodes in WSN. Trust calculation algorithm provide the trust-based routing table for every node. ...
[12] evaluated the performance of the following routing protocols. Ad hoc on demand routing protocol, dynamic routing protocol and dynamic MANET on demand routing protocol for ZigBee. ...
doi:10.47392/irjash.2021.083
fatcat:ldtqx2iegzec7p3tkjlzor2cge
Immensely Discriminate Routing in Wireless Networks
2017
Indonesian Journal of Electrical Engineering and Computer Science
In this paper, we propose Immensely Discriminate Routing protocol is used for multihop routing in wireless network. ...
Here, node distance, node link, node trust and node quality of service is evaluated the next hop. This parameters are determined an efficient path in the wireless network. ...
In this scheme, the next hop node selection based on node link, Distance and quality of Service parameters. The above parameters are determined the next hop selection is evaluated by matrix. ...
doi:10.11591/ijeecs.v8.i3.pp712-714
fatcat:gkae2g2fezgndowpvxlwipf4ay
INFORMATION BASED MUTABLE TRUST COMMUNICATION SCHEME FOR HETEROGENEOUS WIRELESS NETWORKS
2018
Asia Pacific Journal of Contemporary Education and Communication Technology
This paper addressed the past research effort in the direction of infrastructure based routing protocol. ...
Moreover, the focus is on the evaluations of accuracy over the trust, hops and non trust based factors. We designed and implemented a model for the comprehensive investigations over the trust issue. ...
Infrastructure Based Mutable Trust Scheme We proposed and evaluated an infrastructure based routing protocol for distributed heterogeneous networks. ...
doi:10.25275/apjcectv4i1ict1
fatcat:cjwdppns25f5hf2umi6il42lfa
An Encrypted Trust-Based Routing Protocol
[article]
2015
arXiv
pre-print
In this paper, we propose a novel trust-based routing protocol based on a fully homomorphic encryption scheme. ...
The interest in trust-based routing protocols has grown with the advancements achieved in ad-hoc wireless networks.However, regardless of the many security approaches and trust metrics available, trust-based ...
Sanzgiri et al. in [4] propose a secure routing protocol based on authentication mechanisms. Zhang et al. in [5] provide a formal study of trust-based routing in ad-hoc wireless networks. ...
arXiv:1512.03280v1
fatcat:2cthuhpzirf5lnngx4gxupwu7i
Systematic literature review on designing trust-based security for WSNs
2019
Indonesian Journal of Electrical Engineering and Computer Science
The results were analyzed focusing on the designs, applications and protocols and trust factors. ...
<span>The study assessed the design and development of trust-based security for wireless sensor networks. ...
RQ3: What are the secure routing processes in WSNs? The protocols for the trust evaluation for secure routing in WSNs have been focused. ...
doi:10.11591/ijeecs.v14.i3.pp1395-1404
fatcat:2khjokxovbhq7kafewvuictqsa
Trust based Secure Reliable Route Discovery in Wireless Mesh Networks
2019
KSII Transactions on Internet and Information Systems
In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security ...
The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio. ...
Eventhough RPASRP and TSRR implement similar reputation evaluation mechanism, TSRR protocol differs by selecting reliable trust based route by implementing Cross layer based dynamic reputation evaluation ...
doi:10.3837/tiis.2019.07.004
fatcat:ax4uucipxbdg3gn4h6x4g7c6ta
A Survey of Wireless Sensor Network Security and Routing Techniques
2015
Research Journal of Applied Sciences Engineering and Technology
Trust-aware routing protocols play a vital role in security of Wireless Sensor Networks (WSNs). ...
The main focus is on trust concepts and trust based approaches for wireless sensor networks. The study also highlights the difference between trust and security in the context of WSNs. ...
Based on previous work, this study focuses on secure routing The WSN routing protocols are classified based on mode of functions, network structure and participation styles of sensor nodes. ...
doi:10.19026/rjaset.9.2595
fatcat:4fcnqn54nnhbzap7p6muntmlwq
Review Of Trust Models In Wireless Sensor Networks
2014
Zenodo
To solve this issue, a trust model is required to find malicious, selfish and compromised insiders by evaluating trust worthiness sensors from the network. ...
It supports the decision making processes in wireless sensor networks such as pre key-distribution, cluster head selection, data aggregation, routing and self reconfiguration of sensor nodes. ...
The direct trust dependent link state routing protocol (DTLSRP) [26] is a trust based routing protocol to protect network from routing attacks. ...
doi:10.5281/zenodo.1092174
fatcat:u5kvi6ozhzg6xivywxyasytawy
Avoiding Selfishness by Effective Routing Using Trust Based Mechanism
2014
IOSR Journal of Electronics and Communication Engineering
The trust based routing algorithm is compared with the conventional routing protocols on the basis of mainly five parameters i.e. trust level, throughput , delay, packet delivery ratio and overhead. ...
The Trust Based Routing Algorithm routes the packets through optimal energy nodes and thus leads to a more efficient high quality network. ...
Here the trust mechanism is based on watchdog mechanism. Here the main disadvantage is trust evaluation based on nodes QOS property. ...
doi:10.9790/2834-09333037
fatcat:6ye76hzepnc6zox4574mjhmzpy
Trust Centric Stable Routing For Wireless Mesh Networks
2017
International Journal of Intelligent Engineering and Systems
To address this issue, a protocol named Trust-Centric Stable Routing (TCSR) is proposed for WMNs which incorporates security, reliability enhancement and integration of payment systems. ...
Here, trusted nodes with forwarding reliability are selected for secured and efficient data transmission by introducing reliable reputation based trust computation algorithm. ...
. 2) Route discovery based on trust metric and cross layer based link quality metric 3) Enforcing cooperation among the nodes by integrating payment system 4) Designing a trust-centric stable routing protocol ...
doi:10.22266/ijies2017.1231.16
fatcat:cvlljmnopzej7azl3vrwjtoz6a
Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET
2021
Advances in Multidisciplinary & Scientific Research Journal Publication
Therefore, a highly secured Hybrid Trust-based Anonymous Authenticated Routing Protocol (HTBAARP) to mitigate flooding attacks is to be developed to avoid unauthorized access and to detect malicious nodes ...
This will be achieved by integrating a Modified Authenticated Anonymous Routing Protocol (MAASR) to a Trusted Management Scheme (TMS). ...
Authenticated Anonymous Secured Routing Protocol (AASR), develop and evaluate a trust-based management scheme, hybridize the trust-management scheme with the Modified Anonymous Authenticated Secured Routing ...
doi:10.22624/aims/abmic2021p12
fatcat:e2mwidlf75el5i32iuqkgpzva4
Design of Hierarchical Trust based Efficient Cluster Head Selection in WSN (HTECH)
2016
Indian Journal of Science and Technology
This trust is evaluated based on node cooperativeness, Unselfishness, honest and data transmission rate. ...
In this paper, we propose Design of Hierarchical Trust based Efficient Cluster Head Selection in WSN (HTECH) which demonstrates the Cluster Head (CH) selection process based on Trust based routing in WSN ...
Hierarchical trust management protocol 6 applies both trust-based intrusion detection and trust-based geographic routing. ...
doi:10.17485/ijst/2016/v9i26/90074
fatcat:litpywiswneyfi4fzjp57fh3zu
GRPW-MuS-s: A Secure Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks
2016
Communications on Applied Electronics
GRPW-MuS (Geographic Routing to Multiple Sinks in connected wireless sensor networks based on Multiple Sinks) is one of the basic routing protocols used for Supporting Mobile Sinks in Wireless Sensor Networks ...
GRPW-MuS, a geographical routing protocol for wireless sensor networks , is based on an architecture partitioned by logical levels, on the other hand based on a multipoint relaying flooding technique to ...
But the scheme is based on trust evaluation, which predicts the future events by collecting the past events, so the trust evaluated by the node lags behind the attacks. ...
doi:10.5120/cae2016652472
fatcat:v6t6pfllunft7fhdvkht52losq
Attacks and Secure Geographic Routing In Wireless Sensor Networks
2017
Indonesian Journal of Electrical Engineering and Computer Science
GRPW (Geographic Routing in connected wireless sensor networks based on Multiple Sinks) is one of the basic routing protocols used for Supporting Mobile Sinks in Wireless Sensor Networks. ...
GRPW , a geographical routing protocol for wireless sensor networks , is based on an architecture partitioned by logical levels, on the other hand based on a multipoint relaying flooding technique to reduce ...
But the scheme is based on trust evaluation, which predicts the future events by collecting the past events, so the trust evaluated by the node lags behind the attacks. ...
doi:10.11591/ijeecs.v5.i1.pp147-158
fatcat:354texwytjbr7jxdkox7awap5e
« Previous
Showing results 1 — 15 out of 17,820 results