2020
DOI: 10.1007/s11277-020-07392-1
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure Data Forwarding with ANFIS and Trust Evaluation in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
6
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 14 publications
1
6
0
Order By: Relevance
“…[7][8][9] These articles used the threshold value of trust to detect the attack. Similar concept is also observed in fuzzy logic-based secure data transmission, 10 Kalman filter, 11 decision tree 12 and reinforcement learning. 13 It has been noticed that every trust or reputation calculation method needs a threshold value to decide the node's dependency for reliable transmission.…”
Section: F I G U R E 1 Nodes' Frequency In the Path Under (A) Benign Case (B) Carousel Attack (C) Stretch Attacksupporting
confidence: 57%
“…[7][8][9] These articles used the threshold value of trust to detect the attack. Similar concept is also observed in fuzzy logic-based secure data transmission, 10 Kalman filter, 11 decision tree 12 and reinforcement learning. 13 It has been noticed that every trust or reputation calculation method needs a threshold value to decide the node's dependency for reliable transmission.…”
Section: F I G U R E 1 Nodes' Frequency In the Path Under (A) Benign Case (B) Carousel Attack (C) Stretch Attacksupporting
confidence: 57%
“…DrivMan can be utilized as a compelling answer to forgive both data provenance and data uprightness to shrewd vehicles in VANETs for their safe and reliable activity. Another recent trust-based methodology for secure data forwarding in VANETs was proposed in [31] using artificial intelligence (AI) and trust evaluation. They used the fuzzy logic technique and neural network for the trust evaluation algorithm.…”
Section: A State Of Artmentioning
confidence: 99%
“…Identifying the node's presence in the network is not enough; the nodes should also be recognized. Vampire nodes can be identified using trust‐based detection algorithms, such as References 7,8,10, where a threshold trust value is specified. This value is either based on prior information or is not flexible enough to adapt to the ever‐changing WSN environment.…”
Section: Proposed Solutionsmentioning
confidence: 99%
“…[7][8][9] These studies detected the assault based on a trust threshold value. Fuzzy logic safe data transfer, 10 Kalman filter, 11 decision tree, 12 and reinforcement learning 13 are also examples of similar concepts. Any trust or reputation calculation technique requires a threshold value to determine the reliability of a node's transmission.…”
Section: Introductionmentioning
confidence: 99%