S Abdelwahab
Trust-based security models in wireless sensor networks: a survey
Abdelwahab, S; Gaber, T; Wahed, M
Authors
T Gaber
M Wahed
Abstract
One of the major challenges facing wireless sensor networks today is the security. The deployment of sensor nodes is usually done in unattended or hostile environment. This makes the networks susceptible to various threats. It is known that sensor nodes suffer from limitations in their resources. Such limitations make the employment of conventional security solutions impractical. Thus, another non-conventional solution, such trust-based security, has been suggested as an effective way to secure WSNs. Recently, many trust models for securing WSNs have been proposed. In this paper, a survey about different WSNs trust model is presented. These models are described and discussed in terms of network architectures, adopted applications, used trust management schemes and applied trust computation methodologies. Also comparisons among these different models are conducted under defined a set of criteria to evaluate their strengths and weaknesses. Last but not least, a discussion of the findings is also given.
Citation
Abdelwahab, S., Gaber, T., & Wahed, M. (2017). Trust-based security models in wireless sensor networks: a survey. International Journal of Computational Intelligence Studies, 6(2/3), 245. https://doi.org/10.1504/IJCISTUDIES.2017.089057
Journal Article Type | Article |
---|---|
Publication Date | Jan 1, 2017 |
Deposit Date | Aug 20, 2019 |
Journal | International Journal of Computational Intelligence Studies |
Print ISSN | 1755-4977 |
Electronic ISSN | 1755-4985 |
Publisher | Inderscience |
Volume | 6 |
Issue | 2/3 |
Pages | 245 |
DOI | https://doi.org/10.1504/IJCISTUDIES.2017.089057 |
Publisher URL | https://doi.org/10.1504/IJCISTUDIES.2017.089057 |
Related Public URLs | https://www.inderscience.com/jhome.php?jcode=ijcistudies |
You might also like
Deep churn prediction method for telecommunication industry
(2023)
Journal Article
Optimized and efficient image-based IoT malware detection method
(2023)
Journal Article
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search