2016
DOI: 10.1109/tifs.2016.2570740
|View full text |Cite
|
Sign up to set email alerts
|

ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. To conquer that challenge, an active detection-based security and trust routing scheme named ActiveTrust is proposed for WSNs. The most important innovation of ActiveTrust is that it avoids black holes through the active cre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
185
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 321 publications
(187 citation statements)
references
References 35 publications
1
185
0
1
Order By: Relevance
“…Through the active detection routing protocol the trust of the node can be easily obtained and it can increase the efficiency of the data route in choosing the nodes that are having high trust which can avoid black holes [1]. It refers to a route without any data packets, by sending a dummy data to the sink just to satisfy the attacker nodes to launch an attack so that the system can identify the attacker behavior and it can mark the black hole location.…”
Section: Active Trust Scheme 31 Active Detection Routing Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…Through the active detection routing protocol the trust of the node can be easily obtained and it can increase the efficiency of the data route in choosing the nodes that are having high trust which can avoid black holes [1]. It refers to a route without any data packets, by sending a dummy data to the sink just to satisfy the attacker nodes to launch an attack so that the system can identify the attacker behavior and it can mark the black hole location.…”
Section: Active Trust Scheme 31 Active Detection Routing Protocolmentioning
confidence: 99%
“…Here the route will select a node which is having high trust as the next hop to avoid black holes which thereby improves the success ratio of reaching the sink [1]. The figure 2 represents the data routing protocol.…”
Section: Data Routing Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…[1][2][3][4][5][6][7]. Due to their inherent characteristics of resourceconstraint, for data collection, energy efficiency is another vital issue since replacing or recharging the batteries of sensor nodes is extremely difficult [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…[1][2][3][4][5][6][7]. Due to their inherent characteristics of resourceconstraint, for data collection, energy efficiency is another vital issue since replacing or recharging the batteries of sensor nodes is extremely difficult [1][2][3][4]. In addition, some sensing applications require that each data packet is successfully delivered to sink with statistical probability such as 70-95 % [1,[8][9][10][11], which is sufficient for these applications such as environment (temperature, humidity) and agriculture (water tank, irrigation) [1,10].…”
Section: Introductionmentioning
confidence: 99%