Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








7 Hits in 1.1 sec

ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks

Yuxin Liu, Mianxiong Dong, Kaoru Ota, Anfeng Liu
2016 IEEE Transactions on Information Forensics and Security  
Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications.  ...  Index Terms-black hole attack, network lifetime, security, trust, wireless sensor networks Manuscript  ...  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks 9   1 (1 ) , (1 ) , ( ) | x d in no d m m P d m d m P m d          For a detection route  ... 
doi:10.1109/tifs.2016.2570740 fatcat:jlhs4s2vdvfj7p23vzcrq6pxji

Dynamic Trust: A Protected and Trustable Directing in Remote Sensor Systems

Thota Siva Ratna Sai, Palvadi Srinivas Kumar
2017 International Journal of Machine Learning and Networked Collaborative Engineering  
We assess the proposed structure both effectively and absolutely, and the outcomes demonstrate the attainability and ability of the lightweight secure provenance plot in seeing pack produce and calamity  ...  Provenance association for sensor systems demonstrates two or three testing fundamentals, for example, low centrality and data trade constrain utilization, convincing point of confinement and secure transmission  ...  1.Related Work Present Wireless sensor networks (WSN) 1 is emerging all the domains because of its less cost and the disadvantage of this is getting affected by dark gap attack. it is a standout amongst  ... 
doi:10.30991/ijmlnce.2017v01i01.002 fatcat:sfi4odwcsrfqtbvs7jnddvadze

AN INVESTIGATION STUDY ON ENERGY EFFICIENT AUTHENTICATION TECHNIQUES IN WIRELESS SENSOR NETWORK

Antony Cynthia
2018 International Journal of Advanced Research in Computer Science  
Wireless sensor networks (WSNs) are ubiquitous technology for the growth of low cost and low power wireless technology.  ...  In existing authentication methods, key management schemes and hashing techniques were used for increasing the authentication and security level performance.  ...  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Network An active security and trust routing scheme termed AT is introduced for WSN.  ... 
doi:10.26483/ijarcs.v9i2.5893 fatcat:xbpwxfzmhng53cfcffnkznfb3e

EETCA: Energy Efficient Trustworthy Clustering Algorithm for WSN

2016 KSII Transactions on Internet and Information Systems  
A Wireless Sensor Network (WSN) is composed of several sensor nodes which are severely restricted to energy and memory.  ...  The experimental results of EETCA are satisfactory in terms of reduced energy consumption and prolonged lifetime of the network.  ...  In [17] , a secure and trustable routing scheme namely ActiveTrust is proposed for WSN. The major goal of this work is to combat against black hole attacks, which show impact over data collection.  ... 
doi:10.3837/tiis.2016.11.013 fatcat:noj7b3jimzcjbjlytjrd3oyvyq

A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks

Jiawei Tang, Anfeng Liu, Jian Zhang, Neal Xiong, Zhiwen Zeng, Tian Wang
2018 Sensors  
ActiveTrust [30] is a good secure routing scheme proposed for wireless sensor networks and is based on active trust.  ...  Related Work Much research has been conducted on the secure routing schemes of wireless sensor networks.  ...  ., Z.Z. and T.W. commented on the paper.  ... 
doi:10.3390/s18030751 pmid:29494561 pmcid:PMC5876602 fatcat:4z6notvtpfcjdaeffnvcpqgyie

9 International Journal for Modern Trends in Science and Technology Secure and Trustable Routing in WSN for End to End Communication

Maniyar Mashak, Prof, Dakhode
2017 International Journal for Modern Trends in Science and Technology   unpublished
Active Trust can importantly improve the data route success probability and ability opposite black hole attacks and can optimize network lifetime.  ...  Our proposed protocol can authenticate sensors to establish the path and to establish the path key.  ...  Energy and Memory Efficient Clone Detection in Wireless Sensor Networks.  ... 
fatcat:uv4adkn5ircgdeh5acnus3mh3y

Task and Participant Scheduling of Trading Platforms in Vehicular Participatory Sensing Networks

Heyuan Shi, Xiaoyu Song, Ming Gu, Jiaguang Sun
2016 Sensors  
The vehicular participatory sensing network (VPSN) is now becoming more and more prevalent, and additionally has shown its great potential in various applications.  ...  For a trading platform in markets, its purpose is to maximize the profit by selecting tasks and recruiting participants who satisfy the requirements of accepted tasks, rather than to improve the quality  ...  Liu et al. propose an active detection-based security and trust routing scheme named ActiveTrust [10] .  ... 
doi:10.3390/s16122013 pmid:27916807 pmcid:PMC5190994 fatcat:mulfx7uzaffk3oevqby4w2apom