2023
DOI: 10.13052/jcsm2245-1439.1213
|View full text |Cite
|
Sign up to set email alerts
|

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score

Abstract: Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the external physical environment to obtain data information, and use wireless communication technology to provide users with information transmission services. At this stage, communication and security mechanisms are the main problems faced by WSN. This is because most of the existing sensors are powered by batteries with very limited energy, and most of them are deployed in an outdoor open environment, which is easy to be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(10 citation statements)
references
References 19 publications
(37 reference statements)
0
10
0
Order By: Relevance
“…WSNs are the backbone component of the IoT, which is widely used for universal connectivity, security, control, and general awareness of things. Low-powered, small-sized sensors can efficiently monitor and collect data from any environment [1,2,14,20,21,22,23]. "Things" in the IoT refer to tiny embedded physical sensing devices (i.e., sensor nodes) that are connected to the Internet to achieve a specified task [4].…”
Section: Wsns and The Iotmentioning
confidence: 99%
See 3 more Smart Citations
“…WSNs are the backbone component of the IoT, which is widely used for universal connectivity, security, control, and general awareness of things. Low-powered, small-sized sensors can efficiently monitor and collect data from any environment [1,2,14,20,21,22,23]. "Things" in the IoT refer to tiny embedded physical sensing devices (i.e., sensor nodes) that are connected to the Internet to achieve a specified task [4].…”
Section: Wsns and The Iotmentioning
confidence: 99%
“…WSNs provide special challenges for security protocol designers due to the following unique characteristics [6,7,8,15,19,21,22,23,26,36,37,39,40,41]:…”
Section: Challenges Of Security Protocols In Wsnsmentioning
confidence: 99%
See 2 more Smart Citations
“…For network security situational awareness technology, the acquisition of situational elements, situational assessment, and situational prediction are important key links in the research field of this technology. Network security situational awareness technology can integrate internal and external network environment information, and conduct comprehensive analysis and evaluation of the collected relevant information [5]. By conducting situational assessment on the results obtained from fusion calculations, it is possible to provide a more comprehensive analysis of network security situational information while ensuring accuracy.…”
Section: Introductionmentioning
confidence: 99%