2023
DOI: 10.1038/s41598-023-28721-x
|View full text |Cite
|
Sign up to set email alerts
|

A secure and dependable trust assessment (SDTS) scheme for industrial communication networks

Abstract: Due to tamper-resistant sensor nodes and wireless media, Industrial Wireless Sensor Networks (WSNs) are susceptible to various security threats that severely affect industrial/business applications. The survival of sensor networks is highly dependent on the flourishing collaboration of sensor nodes. Trust management schemes seem to be realistic and promising techniques to improve security as well as cooperation (dependability) among sensor nodes by estimating the trust level (score) of individual sensor nodes.… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 51 publications
0
5
0
Order By: Relevance
“…In [10], Khan et al introduce a Secure, Dependable Trust Assessment (SDTS) scheme tailored for industrial WSNs. This scheme employs robust trust evaluation components to detect and counter unexpected behaviors such as on-off attacks and node misbehavior.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [10], Khan et al introduce a Secure, Dependable Trust Assessment (SDTS) scheme tailored for industrial WSNs. This scheme employs robust trust evaluation components to detect and counter unexpected behaviors such as on-off attacks and node misbehavior.…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, N nodes are positioned within an MxM area. In the initial phase of network setup, each node is allocated a certain amount of energy, as referenced in sources [10,11]. Furthermore, fixed spectrum channels are designated to facilitate communication between the nodes.…”
Section: Development Of Virtual Region and Placement Of Nodesmentioning
confidence: 99%
“…Instead of focusing solely on cybersecurity or data transmission, we investigate how a sensor can self-monitor and detect sabotage attempts in real time. Furthermore, our proposal uses anomaly detection algorithms optimized to be implemented directly in sensors, overcoming the barrier of computational capacity that limited previous research [27]. By focusing on a use case, we provide a tangible and direct application of our solutions.…”
Section: Review Of Similar Workmentioning
confidence: 99%
“…The detection rate and packet delivery ratio of their method's numerical simulations were comparable. The research paper [20] presented a well-structured and inspiring secure, trustable trust evaluation system for manufacturing WSNs to handle unpredicted behavioral patterns such as an on-off invasion, negative attack, garnished attack, etc. by using robust trust evaluation techniques based on node misbehavior and success ratio.…”
Section: Related Workmentioning
confidence: 99%