2017
DOI: 10.1007/s12046-016-0588-2
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…In WSNs, many evidences can be collected, such as routing success rate, packet success rate, forwarding delay, data correctness, and so on 19 . Here, we just list three typical types of evidences: the packet success rate, the routing failure rate, and the forwarding delay.…”
Section: Design Of Detection Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…In WSNs, many evidences can be collected, such as routing success rate, packet success rate, forwarding delay, data correctness, and so on 19 . Here, we just list three typical types of evidences: the packet success rate, the routing failure rate, and the forwarding delay.…”
Section: Design Of Detection Systemmentioning
confidence: 99%
“…Many methods are proposed to detect these attacks, such as encryption, verification, and trust behavior observation. Prabha and Latha 19 adopted an elapsed time at node (ETN) to find the data modification attack, which measures sensor's elapsed time from the data reception to the data forwarding. Sultana et al 26 proposed a novel lightweight secure scheme for detecting provenance forgery, which uses the in‐packet Bloom filters to encode provenance and does data verification and reconstruction at the base station.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Two malicious nodes are placed as neighbor nodes for source and destination and create an illusion that it is the shortest path for transmitting data. However security issues and energy conservation plays a vital role in WSN [4] [5]. To achieve these objectives, SRI-MAC protocol is proposed this paper.…”
Section: Introductionmentioning
confidence: 99%