The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.1109/access.2019.2905550
|View full text |Cite
|
Sign up to set email alerts
|

BLTM: Beta and LQI Based Trust Model for Wireless Sensor Networks

Abstract: To defend against internal attacks in wireless sensor networks (WSNs), building a trust model between sensors nodes has been proved to be an effective way in this paper. The most current trust models only consider communication behavior when calculating direct trust, which is directly calculated based on the interactions between sensor nodes. However, this is not enough because of the various types of attacks. Furthermore, the adverse effect of poor-quality links on the trust value of normal nodes is not discu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
34
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 63 publications
(47 citation statements)
references
References 26 publications
0
34
0
Order By: Relevance
“…The Trust‐reputation 3‐8 and game‐theory 9‐11 ‐based security frameworks have intrigued great attentions in research key groups. In previous studies, 3,11,12 the authors explore statistical interference in licensed spectrum and then adopt a cooperative game theory approach for allocating spectrum holes to in CR‐environment. Subsequently, they propose a novel routing metric based on energy, trust, and social feature for node selection and data forwarding in their proposed opportunistic routing framework.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…The Trust‐reputation 3‐8 and game‐theory 9‐11 ‐based security frameworks have intrigued great attentions in research key groups. In previous studies, 3,11,12 the authors explore statistical interference in licensed spectrum and then adopt a cooperative game theory approach for allocating spectrum holes to in CR‐environment. Subsequently, they propose a novel routing metric based on energy, trust, and social feature for node selection and data forwarding in their proposed opportunistic routing framework.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In other studies, 6,15 the authors only acknowledge self‐observations for trust computation, whereas the authors inother works 12,16 use this trust value for guiding the interaction of legitimate node in such a manner that the internal confronts and collusion attacks are countered. Nevertheless, the authors in previous works 3,17 propose a novel approach for immunizing the trust of a legitimate SU by introducing an analyzing module based on the Link Quality Indicators. Nevertheless, the computation of direct trust (from self‐observations) only recognize the data and energy beliefs and totally ignores the energy belief.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Trust is the key influence factor of relationships in social networks. Individuals in social networks and sensor nodes in WSN share great similarities [20]. erefore, it is quite natural to evaluate each node's reliability based on both direct and recommendation relationship.…”
Section: Related Workmentioning
confidence: 99%
“…According to formula (20), the entropy of direct trust degree and indirect trust degree can be obtained by the following formula:…”
mentioning
confidence: 99%