2022
DOI: 10.3390/app12042045
|View full text |Cite
|
Sign up to set email alerts
|

Utilising Acknowledge for the Trust in Wireless Sensor Networks

Abstract: Wireless Sensor Networks (WSNs) are emerging networks that are being utilized in a variety of applications, such as remote sensing images, military, healthcare, and traffic monitoring. Those critical applications require different levels of security; however, due to the limitation of the sensor networks, security is a challenge where traditional algorithms cannot be used. In addition, sensor networks are considered as the core of the Internet of Things (IoT) and smart cities, where security became one of the m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…Consequently, procedure B (shown in Algorithm 2) describes the technical details of IHF productions and insertions into the sender transmission lines, . As discussed, each sender maintains an IHF queue, , to ensure secure multi-path data transmission in WSN [ 45 , 46 ]. In this case, are evaluated by node-centric parity bit engine to identify true cases and false cases for inserting IHF into .…”
Section: Methodsmentioning
confidence: 99%
“…Consequently, procedure B (shown in Algorithm 2) describes the technical details of IHF productions and insertions into the sender transmission lines, . As discussed, each sender maintains an IHF queue, , to ensure secure multi-path data transmission in WSN [ 45 , 46 ]. In this case, are evaluated by node-centric parity bit engine to identify true cases and false cases for inserting IHF into .…”
Section: Methodsmentioning
confidence: 99%
“…TMSs provide a significant advantage over traditional cryptographic algorithms to improve security, resource efficiency as well as cooperation (dependability) among SNs against internal adversaries by estimating the trust level (score) of individual SNs 17 . A significant amount of research work has been carried out on trust modeling in the last decade but, to the best of our knowledge, existing work [17][18][19][20][21][22][23][24][25] , and [31][32][33][34][35] did not fulfill the vital fundamental requirements (cooperation, resource efficiency, energy efficiency, algorithm complexity, coverage, connectivity, availability, high sensing fidelity, fault tolerance, data confidentiality, data integrity) for the survival of WSNs. Even most of the work [36][37][38] has no adaptability, i.e., cannot be tuned according to application requirements and network capabilities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition, wifi gadgets have become much smaller and cheaper in recent decades. A collection of wireless nodes connects to a Mobile Ad hoc Network (MANET), allowing changeable network settings without relying on any underlying architecture [1][2][3][4]. Each node in the network has a data transceiver to transmit and receive information.…”
Section: Introductionmentioning
confidence: 99%
“…While all nodes behave selflessly, the connection will perform successfully. In a black hole attack, authors [1] developed robust route discovery in AODV. This technique has the benefit of being simple to create and requiring no additional overhead for resource-restricted devices.…”
Section: Introductionmentioning
confidence: 99%