2015
DOI: 10.1007/s11277-015-2636-3
|View full text |Cite
|
Sign up to set email alerts
|

A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) are susceptible to many security threats and are specifically prone to physical node capture in which the adversary can easily launch the so-called insider attacks such as node compromise, bypassing the traditional security mechanisms based on cryptography primitives. So, the compromised nodes can be modified to misbehave and disrupt the entire network and can successfully perform the authentication process with their neighbors, which have no way to distinguish fraudulent nodes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(29 citation statements)
references
References 23 publications
0
29
0
Order By: Relevance
“…The graphical representation for the average delay is given in Figure . Here, the proposed KID‐ SASR protocol is compared with the existing protocols EDTM, TERP, RaRTrust, and AF‐TNS under 2 to 10 malicious nodes. From the analysis, EDTM has the highest delay of 24ms for 10 malicious nodes and our proposed KID‐SASR algorithm has the lowest delay of 4ms for 10 malicious nodes.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…The graphical representation for the average delay is given in Figure . Here, the proposed KID‐ SASR protocol is compared with the existing protocols EDTM, TERP, RaRTrust, and AF‐TNS under 2 to 10 malicious nodes. From the analysis, EDTM has the highest delay of 24ms for 10 malicious nodes and our proposed KID‐SASR algorithm has the lowest delay of 4ms for 10 malicious nodes.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…Reputation Based (RB) security scheme has been developed by author [23] [24]. The developed technique has the capability to diagnose and separate malicious and faulty nodes.…”
Section: Reputation Mechanismmentioning
confidence: 99%
“…Since the utilities are written in the standard form of dynamic programming, we can optimize the detection rate dynamically with a planning horizon of length . If = 0, then 0 is chosen to solve the problem formalized by (9)- (12). In period = 1, the system updates knowledge on information set and uses (9)- (12) to optimize anew over the next planning periods.…”
Section: Dynamic Programmingmentioning
confidence: 99%
“…Thus, the focus of the study is about internal attack such as detection, revocation, and tolerance of the compromised nodes and replicated nodes that have been physically captured. Normally, there are three ways to detect internal attacks: analyzing the attack behavior [5][6][7][8], detecting the compromised nodes [9][10][11][12][13], and verifying replica attack [14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%