2016
DOI: 10.1016/j.jnca.2015.06.013
|View full text |Cite
|
Sign up to set email alerts
|

BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
71
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 118 publications
(76 citation statements)
references
References 26 publications
0
71
0
Order By: Relevance
“…One hundred sensor nodes are randomly distributed in the region, and the base station is located in the center of the monitoring area. The perception a) b) The performance of the proposed method is compared with that of MD-WTE [34] and BTRES [35]. Figures 1 and 2 show the trust value of the normal node and malicious node with time as malicious node proportion is 15% and 30%, respectively.…”
Section: Resultsmentioning
confidence: 99%
“…One hundred sensor nodes are randomly distributed in the region, and the base station is located in the center of the monitoring area. The perception a) b) The performance of the proposed method is compared with that of MD-WTE [34] and BTRES [35]. Figures 1 and 2 show the trust value of the normal node and malicious node with time as malicious node proportion is 15% and 30%, respectively.…”
Section: Resultsmentioning
confidence: 99%
“…Technical innovations require novelty from companies, restructuring their business processes and using modern technologies (Ardito et al, 2019). Many authors write about the active use of new information technologies in reputation management, as well as convincing research results (Zhao et al, 2019;Fang et al, 2016;He & Xiong, 2017). However, research on reputational management does not emphasize that reputational crisis causes increased innovative activity in the use of new channels and tools for communication with audiences.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In this section, we briefly describe our research work from three aspects: The application of game theory, the application of trust, and the application of joint game theory and trust; and give some examples in the literature. Through the investigation of literature, we have concluded that most researchers use the following types of games: Dynamic game [32][33][34][35][36][37][38][39][40][41][42][43][44][45], static game [46], non-cooperative game [47][48][49][50][51], cooperative game [52][53][54][55][56][57][58][59], security game [60][61][62][63][64], and trust game [65][66][67][68][69].…”
Section: Relate Summarized Workmentioning
confidence: 99%