Conventional trust management techniques developed for wired and wireless sensor networks are not well suited for applications due to their higher memory and power consumption. To overcome this an efficient Weighted Trust EvaluationSystem for Wireless Sensor Networks (WTES-WSN), is proposed in this paper. A trust detection system is proposed based on node identities and an enhanced trust evaluating approach is defined in cooperation between cluster heads.This approach significantly increases the system efficiency and reduces the cost of trust evaluation. Moreover a novel scheme based on behavior-trust evaluation and the hash table checker is used to detect malicious nodes is proposed in this paper. Also, theoretical and simulation results s...
Abstract—We propose a trust-based intrusion detection scheme utilizing a highly scalable hierarchica...
While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), th...
This work discusses a novel of the most challenging issues so far is the extension of network lifeti...
With the wide applications of wireless sensor networks (WSNs) in various fields, such as environment...
hierarchical topology, malicious node detection. Abstract∗ Deployed in a hostile environment, indivi...
The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborat...
Traditional trust management schemes developed for wired and wireless ad hoc networks are not well s...
Abstract — The major challenge faced by wireless sensor networks is security. Because of dynamic and...
Trust evaluation is an effective method to detect malicious nodes and ensure security in wireless se...
The dependability of trust system and resource efficiency are the most fundamental requirements for ...
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Net...
AbstractTimely detection of anomalous activity in wireless sensor network is critical for the smooth...
Abnormal behavior detection and trust evaluation mode of traditional sensor node have a single funct...
Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operat...
Security techniques like cryptography and authentication can fail to protect a network once a node i...
Abstract—We propose a trust-based intrusion detection scheme utilizing a highly scalable hierarchica...
While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), th...
This work discusses a novel of the most challenging issues so far is the extension of network lifeti...
With the wide applications of wireless sensor networks (WSNs) in various fields, such as environment...
hierarchical topology, malicious node detection. Abstract∗ Deployed in a hostile environment, indivi...
The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborat...
Traditional trust management schemes developed for wired and wireless ad hoc networks are not well s...
Abstract — The major challenge faced by wireless sensor networks is security. Because of dynamic and...
Trust evaluation is an effective method to detect malicious nodes and ensure security in wireless se...
The dependability of trust system and resource efficiency are the most fundamental requirements for ...
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Net...
AbstractTimely detection of anomalous activity in wireless sensor network is critical for the smooth...
Abnormal behavior detection and trust evaluation mode of traditional sensor node have a single funct...
Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operat...
Security techniques like cryptography and authentication can fail to protect a network once a node i...
Abstract—We propose a trust-based intrusion detection scheme utilizing a highly scalable hierarchica...
While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), th...
This work discusses a novel of the most challenging issues so far is the extension of network lifeti...