2020
DOI: 10.21553/rev-jec.250
|View full text |Cite
|
Sign up to set email alerts
|

Modified Dijkstra's Routing Algorithm for Security with Different Trust Degrees

Abstract: A great number of efficient methods to improve the performance of the networks have been proposed in physical-layer security for wireless communications. So far, the security and privacy in wireless communications is optimized based on a fixed assumption about the trustworthiness or trust degrees (TD) of certain wireless nodes. The nodes are often classified into different types such as eavesdroppers, untrusted relays, and trusted cooperative nodes. Wireless nodes in different networks do not completely trust … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…As of now, wireless communications security and privacy are maximized based on a predetermined belief in the dependability of the wireless nodes. According to [12]- [14], they are frequently divided into several sorts, such as eavesdroppers, untrusted relays, and trusted cooperative nodes [15]. However, a node's trustworthiness or TD may not always be obvious and is heavily influenced by the social connections between its users and those of legitimate nodes (such as friendship in social networks) [16]- [18].…”
Section: Introductionmentioning
confidence: 99%
“…As of now, wireless communications security and privacy are maximized based on a predetermined belief in the dependability of the wireless nodes. According to [12]- [14], they are frequently divided into several sorts, such as eavesdroppers, untrusted relays, and trusted cooperative nodes [15]. However, a node's trustworthiness or TD may not always be obvious and is heavily influenced by the social connections between its users and those of legitimate nodes (such as friendship in social networks) [16]- [18].…”
Section: Introductionmentioning
confidence: 99%