2020
DOI: 10.3390/s20061592
|View full text |Cite
|
Sign up to set email alerts
|

Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks

Abstract: The trust computing mechanism has an increasing role in the cooperative work of wireless sensor networks. However, the computing speed, resource overhead, and anti-collaborative attack ability of a trust mechanism itself are three key challenging issues for any open and resource-constrained wireless sensor networks. In this study, we propose a fast, resource-saving, and anti-collaborative attack trust computing scheme (FRAT) based on across-validation mechanism for clustered wireless sensor networks. First, ac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 42 publications
(116 reference statements)
0
2
0
Order By: Relevance
“…Theoretical and experimental analysis shows that this method can improve the computing speed. At the same time, it can effectively save energy, and can effectively resist the cooperative attack of malicious nodes [14]. Liu and Lu et al introduced the secure boot model and BDRM in the routing protocol, and proposed a secure routing protocol integrating trust evaluation mechanism.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Theoretical and experimental analysis shows that this method can improve the computing speed. At the same time, it can effectively save energy, and can effectively resist the cooperative attack of malicious nodes [14]. Liu and Lu et al introduced the secure boot model and BDRM in the routing protocol, and proposed a secure routing protocol integrating trust evaluation mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…In order to avoid the joint misleading of reputation evaluation by malicious nodes, the indirect reputation score needs to be calculated by the adjacent nodes shared by the nodes, and its calculation is shown in formula (14).…”
Section: Design Of Wsn Node Reputation Evaluation Mechanismmentioning
confidence: 99%