2019
DOI: 10.1109/access.2019.2904544
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Exponential-Based Trust and Reputation Evaluation System in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) are vulnerable to many security threats from compromised nodes, and because the WSNs are resource-constrained, the traditional security methods cannot be used to resist the internal attacks from compromised nodes. The trust and reputation evaluation system is the most effective security mechanisms to protect WSNs from internal attacks. The exponential-based trust and reputation evaluation system (ETRES) is proposed for WSNs' node trust and reputation evaluation. ETRES is used to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
34
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 82 publications
(35 citation statements)
references
References 40 publications
(68 reference statements)
1
34
0
Order By: Relevance
“…A number of reputation evaluation schemes have been proposed in the literature for WMSN [9] and WSN [12]- [14]. Currently, different types of reputation models are used to evaluate the reputation value such as fuzzy based [15] and probability based [12].…”
Section: Related Workmentioning
confidence: 99%
“…A number of reputation evaluation schemes have been proposed in the literature for WMSN [9] and WSN [12]- [14]. Currently, different types of reputation models are used to evaluate the reputation value such as fuzzy based [15] and probability based [12].…”
Section: Related Workmentioning
confidence: 99%
“…However, a lot of direct and indirect trust evaluations with cooperation and communication with neighbors may need excess energy and time costs. The exponential-based trust and reputation evaluation system (ETRES) [ 22 ] used exponential distribution to represent the distribution of nodes’ trust in WSN and utilise the entropy theory to measure the uncertainty of direct trust values. The indirect trust is only used to strength interaction information when the uncertainty of direct trust is too high.…”
Section: Related Workmentioning
confidence: 99%
“…The Theory of Uncertain Reasoning, and Privacy Preserving Public Key techniques are recently explored. In other works, 22,23 authors propose a statistical model for SSDF attacks and analyze its impact on Dynamic Spectrum Access in Industrial Internet of Things. Furthermore, they prove the nonexistence of a Nash‐Equilibrium and hence prove the existence of Pareto‐Optimality in presence of adversarial strategies.…”
Section: Literature Reviewmentioning
confidence: 99%