Wireless sensor network is a key technology in Internet of Things. However, due to the large number of sensor nodes and limited security capability, aging nodes and malicious nodes increase. In order to detect the untrusted nodes in the network quickly and effectively and ensure the reliable operation of the network, this paper proposes a dynamic network security mechanism. Firstly, the direct trust value of the node is established based on its behavior in the regional information interaction. Then, the comprehensive trust value is calculated according to the trust recommendation value and energy evaluation value of other high-trust nodes. Finally, node reliability and management nodes are updated periodically. Malicious nodes are detected ...
Abstract—Wireless Sensor Networks (WSNs) is temporarily formed, operated and managed by the nodes th...
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data....
Cryptography based security solutions are not enough for WSNs when there are attacks from interior, ...
Trust evaluation is an effective method to detect malicious nodes and ensure security in wireless se...
Trust is an important issue when a wireless sensor network is used in the fields such as military su...
Security techniques like cryptography and authentication can fail to protect a network once a node i...
Trust is an important issue when a wireless sensor network is used in the fields such as military su...
Trust is an important issue when a wireless sensor network is used in the fields such as military su...
Abstract—Trust is an important factor in transferring data from the source to destination in wireles...
Trust is an important issue when a wireless sensor network is used in the fields such as military su...
This paper analyse the most important and significant advancements in wireless sensor network using ...
As the trust issue in wireless sensor networks is emerging as one important factor in security schem...
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Net...
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data....
Authentication mechanism is the basis of access control and data exchange. In wireless sensor networ...
Abstract—Wireless Sensor Networks (WSNs) is temporarily formed, operated and managed by the nodes th...
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data....
Cryptography based security solutions are not enough for WSNs when there are attacks from interior, ...
Trust evaluation is an effective method to detect malicious nodes and ensure security in wireless se...
Trust is an important issue when a wireless sensor network is used in the fields such as military su...
Security techniques like cryptography and authentication can fail to protect a network once a node i...
Trust is an important issue when a wireless sensor network is used in the fields such as military su...
Trust is an important issue when a wireless sensor network is used in the fields such as military su...
Abstract—Trust is an important factor in transferring data from the source to destination in wireles...
Trust is an important issue when a wireless sensor network is used in the fields such as military su...
This paper analyse the most important and significant advancements in wireless sensor network using ...
As the trust issue in wireless sensor networks is emerging as one important factor in security schem...
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Net...
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data....
Authentication mechanism is the basis of access control and data exchange. In wireless sensor networ...
Abstract—Wireless Sensor Networks (WSNs) is temporarily formed, operated and managed by the nodes th...
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data....
Cryptography based security solutions are not enough for WSNs when there are attacks from interior, ...