2016 International Conference on Information Communication and Embedded Systems (ICICES) 2016
DOI: 10.1109/icices.2016.7518888
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Beta Trust Model in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…However, it costs a lot of energy and increases the time complexity. Umarani [39] established an enhanced beta trust model to find a malicious attack. The neighbor node is selected by the sensor node based on trust information in the course of communication.…”
Section: Related Workmentioning
confidence: 99%
“…However, it costs a lot of energy and increases the time complexity. Umarani [39] established an enhanced beta trust model to find a malicious attack. The neighbor node is selected by the sensor node based on trust information in the course of communication.…”
Section: Related Workmentioning
confidence: 99%
“…But among the related literatures, some merely use the required components while ignoring the others as an integral part of the whole. For example, regarding the reputation fusion, some literatures such as [21,24,26,29,35,36] use both direct reputation and indirect reputation, while others like [30,31,33,41,42,43] only apply direct reputation. For another example, as is shown in Table 1, on the reputation aging, among the literatures that apply direct reputation and/or indirect reputation, only a few of them such as [21,24,25,33] use the reputation aging, while other literatures ignore it for no reason.…”
Section: Reputation Agingmentioning
confidence: 99%
“…For another example, as is shown in Table 1, on the reputation aging, among the literatures that apply direct reputation and/or indirect reputation, only a few of them such as [21,24,25,33] use the reputation aging, while other literatures ignore it for no reason. Besides, by using the concept of binomial reputation, energy reputation [36,37], communication reputation [25,34,35,36,37], and data reputation like [30,34,41,42,59] and so on are introduced so as to save individual node energy and ensure the reliable communication and data transmission. Further, penalty and reward mechanisms [43], light computational complexity such as [21,24,26,27], and energy issues like [43,44,76] and so on are also considered in order to stimulate node cooperation, avoid running complex algorithms, and balance the energy consumed in the network.…”
Section: Reputation Agingmentioning
confidence: 99%
“…Up to now, many trust models are proposed [14][15][16][17][18][19][20] to observe node behaviors and resist internal attacks from compromised nodes. Some typical works are discussed as follows.…”
Section: Related Workmentioning
confidence: 99%