The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015
DOI: 10.1155/2015/385849
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Tree-Based Trust Management Scheme for Secure Routing in Wireless Sensor Networks

Abstract: The unique characteristics of wireless sensor networks make them susceptible to the attacks. The secure scheme is considered in designing the routing protocol and algorithm. The cryptography and authentication secure technology can defend the external attacks but have no way to protect the network when the internal attacks occur. However, the trust management scheme with attack-resistance and robustness can efficiently detect the internal attack. On the condition of defending the attacks, it is also an issue t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 42 publications
0
3
0
Order By: Relevance
“…The authors of [65] suggest a lightweight encryption algorithm that can be run on FPGAs for WSNs. The effectiveness of the XTEA algorithm when employed in conjunction with the confused key was analyzed and compared to the performance of other classic lightweight encryption techniques [68] [77]. The authors of [66] suggest an ECC-based encryption scheme that makes use of homomorphism encryption.…”
Section: Authentication and Authorization Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors of [65] suggest a lightweight encryption algorithm that can be run on FPGAs for WSNs. The effectiveness of the XTEA algorithm when employed in conjunction with the confused key was analyzed and compared to the performance of other classic lightweight encryption techniques [68] [77]. The authors of [66] suggest an ECC-based encryption scheme that makes use of homomorphism encryption.…”
Section: Authentication and Authorization Methodsmentioning
confidence: 99%
“…They demonstrated the improvement in performance as well as the increase of security in comparison to other methods already in use [37] [41]. A full analysis of the many different authentication mechanisms for the internet of things was published in reference [68]. In the field of Internet of Things communications employing WSNs, they examined more than forty different authentication methods and algorithms.…”
Section: Authentication and Authorization Methodsmentioning
confidence: 99%
“…The proposed system greatly improves security and prevents trustless and malicious nodes from becoming the cluster head. Zhi Hu, et al [21] analyzed the attacks and designed the dynamic time window for the distributed trust model with the detection of direct trust and indirect trust. Here, only trusted nodes are considered and constructed the trusted tree, which is based on the path quality of nodes which is used as the gradient for routing.…”
Section: Trust-based Idsmentioning
confidence: 99%