Abstract—We propose a trust-based intrusion detection scheme utilizing a highly scalable hierarchical trust management protocol for clustered wireless sensor networks. Unlike existing work, we consider a trust metric considering both quality of service (QoS) trust and social trust for detecting malicious nodes. By statistically analyzing peer-to-peer trust evaluation results collected from sensor nodes, each cluster head applies trust-based intrusion detection to assess the trustworthiness and maliciousness of sensor nodes in its cluster. Cluster heads themselves are evaluated by the base station. We develop an analytical model based on stochastic Petri nets for performance evaluation of the proposed trust-based intrusion detection scheme, ...
Wireless sensor network (WSN) faces severe security problems due to wireless communication between t...
This paper proposed a newIntrusion Detection mechanism based on Multiple Trust Attributes in Wireles...
Abstract—As the effective supplement to traditional cryptography security, trust management plays a ...
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor ne...
With the wide applications of wireless sensor networks (WSNs) in various fields, such as environment...
hierarchical topology, malicious node detection. Abstract∗ Deployed in a hostile environment, indivi...
Abstract — The major challenge faced by wireless sensor networks is security. Because of dynamic and...
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data....
Security techniques like cryptography and authentication can fail to protect a network once a node i...
Abstract—Trust is an important factor in transferring data from the source to destination in wireles...
The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborat...
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data....
International audienceIn the last few years, the technological evolution in the field of wireless se...
Conventional trust management techniques developed for wired and wireless sensor networks are not we...
International audienceIn the last few years, the technological evolution in the field of wireless se...
Wireless sensor network (WSN) faces severe security problems due to wireless communication between t...
This paper proposed a newIntrusion Detection mechanism based on Multiple Trust Attributes in Wireles...
Abstract—As the effective supplement to traditional cryptography security, trust management plays a ...
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor ne...
With the wide applications of wireless sensor networks (WSNs) in various fields, such as environment...
hierarchical topology, malicious node detection. Abstract∗ Deployed in a hostile environment, indivi...
Abstract — The major challenge faced by wireless sensor networks is security. Because of dynamic and...
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data....
Security techniques like cryptography and authentication can fail to protect a network once a node i...
Abstract—Trust is an important factor in transferring data from the source to destination in wireles...
The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborat...
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data....
International audienceIn the last few years, the technological evolution in the field of wireless se...
Conventional trust management techniques developed for wired and wireless sensor networks are not we...
International audienceIn the last few years, the technological evolution in the field of wireless se...
Wireless sensor network (WSN) faces severe security problems due to wireless communication between t...
This paper proposed a newIntrusion Detection mechanism based on Multiple Trust Attributes in Wireles...
Abstract—As the effective supplement to traditional cryptography security, trust management plays a ...