2021
DOI: 10.1016/j.engappai.2021.104238
|View full text |Cite
|
Sign up to set email alerts
|

Strategies of attack–defense game for wireless sensor networks considering the effect of confidence level in fuzzy environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Meanwhile, our T-S fuzzy trust model can obtain a more accurate trust evaluation value under the premise of ensuring the required stability of IoTs. Referring to [ 3 , 4 , 5 ], we design a repeated game model to perfect the energy-efficient privacy-preserving scheme, where the subgame Nash equilibrium of the repeated game model can balance the data security and network resource consumption [ 6 ]. The contributions of this research are given as follows: Firstly, we propose a novel privacy-preserving scheme based on T-S fuzzy trust theory to mitigate the pollution attacks, in which the security is proved according to the hardness of the discrete logarithm.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, our T-S fuzzy trust model can obtain a more accurate trust evaluation value under the premise of ensuring the required stability of IoTs. Referring to [ 3 , 4 , 5 ], we design a repeated game model to perfect the energy-efficient privacy-preserving scheme, where the subgame Nash equilibrium of the repeated game model can balance the data security and network resource consumption [ 6 ]. The contributions of this research are given as follows: Firstly, we propose a novel privacy-preserving scheme based on T-S fuzzy trust theory to mitigate the pollution attacks, in which the security is proved according to the hardness of the discrete logarithm.…”
Section: Introductionmentioning
confidence: 99%