2019
DOI: 10.3390/s20010165
|View full text |Cite
|
Sign up to set email alerts
|

Information-Aware Secure Routing in Wireless Sensor Networks

Abstract: Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and status is considered in the protocol. The trust value is defined as the attack probability of the node according to previous packet-forwarding behaviors, and the status is a hybrid metric that combines the residual ener… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
32
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(32 citation statements)
references
References 45 publications
0
32
0
Order By: Relevance
“…Shi et al, 19 suggested a secure routing protocol by considering the trust value and the status of the nodes in the suggested protocol. The attack probability of node was well defined as the trust value and the hybrid metric (Residual energy & Dist.…”
Section: Literature Surveymentioning
confidence: 99%
“…Shi et al, 19 suggested a secure routing protocol by considering the trust value and the status of the nodes in the suggested protocol. The attack probability of node was well defined as the trust value and the hybrid metric (Residual energy & Dist.…”
Section: Literature Surveymentioning
confidence: 99%
“…Shi [18] developed a Reputation-Based Mechanism to Stimulate Cooperation (RBMSC) mode. The route for data transmission was obtained by the developed protocol.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Q Shi et al [27] proposed a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information, such as its trust value and status, areconsidered in the protocol.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The review papers [16][17][18][19][20][21][22][23][24][25][26][27][28][29] are not up to the mark. The proposed method in this paper addresses more about the security issues and solved energy consumption, latency and packet delivery ratio problems.…”
Section: Literature Reviewmentioning
confidence: 99%