2021
DOI: 10.1007/s11277-021-08564-3
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(15 citation statements)
references
References 39 publications
0
11
0
Order By: Relevance
“…TBSIOP [ 12 ] utilizes three distinct WSN attributes to compute a node’s likelihood of being malicious. These attributes are in energy depletion, acknowledgment, and forwarding data packets, and these attributes are used for trust computation.…”
Section: Related Workmentioning
confidence: 99%
“…TBSIOP [ 12 ] utilizes three distinct WSN attributes to compute a node’s likelihood of being malicious. These attributes are in energy depletion, acknowledgment, and forwarding data packets, and these attributes are used for trust computation.…”
Section: Related Workmentioning
confidence: 99%
“…Otherwise, the node cannot join the network. The author in [ 25 ] studied a trust-based secure intelligent opportunistic routing protocol to avoid the gray and black-hole attack in the wireless sensor networks. However, these works [ 22 , 23 , 24 , 25 ] proposed secure routing that did not focus on sinkhole attack in VANET.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
“…The author in [ 25 ] studied a trust-based secure intelligent opportunistic routing protocol to avoid the gray and black-hole attack in the wireless sensor networks. However, these works [ 22 , 23 , 24 , 25 ] proposed secure routing that did not focus on sinkhole attack in VANET. The authors in [ 26 ] addressed the method of speed adaptive beacon broadcast (SABB) to propagate information in urban and highway environments.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
“…In addition, the researchers also proposed the opportunistic routing protocol based on the iterative method, such as: LCOR [33], OAPF [34], and BitSOR [35] etc. The forwarding process is divided into two stages in these protocols: one is the transmission process of the current node forwarding to the candidate forwarding node, and the other is the transmission process of the candidate forwarding node forwarding to the target node [36][37][38].…”
Section: Related Workmentioning
confidence: 99%