2015 12th International Symposium on Programming and Systems (ISPS) 2015
DOI: 10.1109/isps.2015.7244964
|View full text |Cite
|
Sign up to set email alerts
|

Dishonest recommendation attacks in wireless sensor networks: A survey

Abstract: Trust and reputation models in wireless sensor networks (WSN) have been recently proposed by many researches as an innovative solution for guaranteeing an effective security mechanism. They play an important role in defending WSNs such as securing routing and data forwarding protocols, against insider attacks. However, despite of the advantages, reputation models face with several security issues, especially in the case of dishonest recommendation attacks, i.e. slandering, self-promoting and collusion where pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…Thus, the network should allow the detection of intrusions. It is therefore necessary to design robust and lightweight algorithms for data encryption, authentication mechanisms for privacy protection, and secure routing for data relays to protect the entire network against passive and active attacks, and denials of external service providers [55,56,57]. Adaptability.…”
Section: Overview Of Wsnsmentioning
confidence: 99%
“…Thus, the network should allow the detection of intrusions. It is therefore necessary to design robust and lightweight algorithms for data encryption, authentication mechanisms for privacy protection, and secure routing for data relays to protect the entire network against passive and active attacks, and denials of external service providers [55,56,57]. Adaptability.…”
Section: Overview Of Wsnsmentioning
confidence: 99%
“…Majority of the existing approaches towards security in WSN are mainly cryptographic in nature whereas there also exists studies that are non-cryptographic in nature e.g. [5], [6]. The cryptographic approaches mainly deals with key management system followed by iterative encryptions using either symmetric or asymmetric keys while non-cryptographic approaches deals with observation of certain form of significant behaviour of nodes followed by formulation of rule set to offer inference to such behaviour in terms of malicious or regular pattern.…”
Section: Introductionmentioning
confidence: 99%