2016
DOI: 10.1007/s00607-016-0518-5
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy-based trusted routing to mitigate packet dropping attack between data aggregation points in smart grid communication network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Then groups with similar status are established. The nodes with weak social relationship may be the malicious nodes and they should be avoided being used to forward traffic [65] . The trust of nodes can also be calculated by using probability theory and packets can be routed according to fuzzy set theory [66] .…”
Section: Securitymentioning
confidence: 99%
“…Then groups with similar status are established. The nodes with weak social relationship may be the malicious nodes and they should be avoided being used to forward traffic [65] . The trust of nodes can also be calculated by using probability theory and packets can be routed according to fuzzy set theory [66] .…”
Section: Securitymentioning
confidence: 99%
“…This approach reduced the energy consumed by each sensor node and improved network lifetime and throughput. In the paper [6], a novel trust-based routing that uses probability theory for trust assessment and fuzzy theory for secured routing is proposed. The trust value is calculated probabilistically for every node before transmitting the packet.…”
Section: Fig 2 Corresponding Tree Topologymentioning
confidence: 99%
“…But the transient fluctuation of channels may result in the rapid change of the threshold values, and then draw mistake detection results. The AI-based detection schemes [34][35][36][37][38][39][40][41][42][43][44][45] find malicious nodes by actively learning their malicious behaviors which are different from those of normal nodes. But these schemes need a long learning process or game process to model the malicious behaviors.…”
Section: Introductionmentioning
confidence: 99%