Open Access
Volume 38, Number 3, June 2020
Page(s) 634 - 642
Published online 06 August 2020
  1. Wang Suzhe, Li Yong, Cheng Wei, et al. Distributed Localization Attack Type Recognition Algorithm for Malicious Nodes in Wireless[J]. Journal of Northwestern Polytechnical University, 2016, 34 (1): 85– 91 [Article](in Chinese) [Google Scholar]
  2. Han Ting, Luo Shoushan, Xin Yang, et al. Dynamic Trust Model with Multiple Decision Factors in MANET[J]. Journal of Beijing University of Posts and Telecommunications, 2013, 36 (5): 86– 89, 104 [Article](in Chinese) [Google Scholar]
  3. Osanaiye O, Alfa A S, Hancke G P. Denial of Service(DoS) Defence for Resource Availability in Wireless Sensor Networks[J]. IEEE Access, 2018, 6: 6975– 7004 [Article] [CrossRef] [Google Scholar]
  4. Wang Shuopeng. Prediction and Analysis of Systemic Network Security Model Based on Data Mining[J]. Journal of Northeast Electric Power University, 2019, 39 (6): 91– 93 [Article](in Chinese) [Google Scholar]
  5. Elshrkawey M, Elsherif S M, Elsayed Wahed M. An Enhancement Approach for Reducing the Energy Consumption in Wireless Sensor Networks[J]. Journal of King Saud University-Computer and Information Sciences, 2018, 30 (2): 259– 267 [Article] [CrossRef] [Google Scholar]
  6. Yu Y, Li K, Zhou W, et al. Trust Mechanisms in Wireless Sensor Networks:Attack Analysis and Countermeasures[J]. Journal of Network and Computer Applications, 2012, 35 (3): 867– 880 [Article] [CrossRef] [Google Scholar]
  7. Xu Xiaobin, Zhang Guangwei, Wang Shangguang, et al. Abnormal Data Filtering Approach Based on Collective Trust for WSN[J]. Journal on Communications, 2014, 35 (5): 108– 117 [Article](in Chinese) [Google Scholar]
  8. Qu Zhaoyang, Song Chenchen, Ren Youxue, et al. Recommendations Based on Collaborative Filtering by User Activity[J]. Journal of Northeast Electric Power University, 2017, 37 (5): 74– 79 [Article](in Chinese) [Google Scholar]
  9. Ganeriwal S, Srivastava M. Reputation-Based Framework for High Integrity Sensor Networks[C]//Proceeding of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, 2004: 66–77 [Google Scholar]
  10. Ishmanov F, Kim S, Nam S. A Secure Trust Establishment Scheme for Wireless Sensor Networks[J]. Sensors, 2014, 14 (1): 1877– 1897 [Article] [CrossRef] [Google Scholar]
  11. Ishmanov F, Kim S, Nam S. A Robust Trust Establishment Scheme for Wireless Sensor Networks[J]. Sensors, 2015, 15 (3): 7040– 7061 [Article] [CrossRef] [Google Scholar]
  12. Ouyang Xi, Tian Bin, Li Dong, et al. A Novel Hierarchical Reputation Model for Wireless Sensor Networks[J]. International Journal of Digital Content Technology and its Applications, 2012, 6 (10): 61– 69 [Article] [Google Scholar]
  13. Zhang Lin, Yin Na, Wang Ruchuan. Research of Malicious Nodes Identification Based on DPAM-DM Algorithm for WSN[J]. Journal on Communications, 2015, 36 (suppl 1): 53– 59 [Article](in Chinese) [Google Scholar]
  14. Zhang Z, Zhu H, Luo S, et al. Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks[J]. IEEE Access, 2017, 5 (99): 12088– 12102 [Article] [CrossRef] [Google Scholar]
  15. Tayyab Khan, Karan Singh, Le Hoang Sona, et al. A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks[J]. IEEE Access, 2019, 7: 58221– 58240 [Article] [CrossRef] [Google Scholar]
  16. Sahoo R R, Ray S, Sarkar S, et al. Guard Against Trust Management Vulnerabilities in Wireless Sensor Network[J]. Arabian Journal for Science & Engineering, 2018, 43 (12): 7229– 7251 [Article] [CrossRef] [Google Scholar]
  17. Singh M, Sardar A R, Majumder K, et al. A Lightweight Trust Mechanism and Overhead Analysis for Clustered WSN[J]. IETE Journal of research, 2017, 63 (3): 297– 308 [Article] [CrossRef] [Google Scholar]
  18. Tariq N, Asim M, Maamar Z, et al. A Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Sensor Node-Powered IOT[J]. Journal of Parallel and Distributed Computing, 2019, 134: 198– 206 [Article] [CrossRef] [Google Scholar]
  19. Wu X, Huang J, Ling J, et al. BLTM:Beta and LQI Based Trust Model for Wireless Sensor Networks[J]. IEEE Access, 2019, 7: 43679– 43690 [Article] [CrossRef] [Google Scholar]
  20. Teng Zhijun, Guo Liwen, Lyu Jinling, et al. WSN Bayes Reputation Evaluation Model Based on Time Series Information Analysis[J]. Journal of Zhengzhou University, 2019, 40 (1): 38– 43 [Article](in Chinese) [Google Scholar]
  21. Li Yun, Yu Jihong, You Xiaohu. An Incentive Protocol for Opportunistic Networks with Resources Constraint[J]. Chinese Journal of Computers, 2013, 36 (5): 947– 956 [Article](in Chinese) [Google Scholar]
  22. Yang Jing, Li Wuyou, Yan Junjie, et al. Collision Behavior Recognizing Data Forwarding for Intermittently Connected Wireless Network[J]. Systems Engineering and Electronics, 2017, 39 (11): 2571– 2579 [Article](in Chinese) [Google Scholar]
  23. Heinzelman W R, Chandrakasan A, Balakrishnan H. Energy-Efficient Communication Protocol for Wireless Microsensor Networks[C]//Proceedings of the 3rd Annual Hawaii International Conference on System Sciences, Hawaii, USA, 2000: 1–10 [Google Scholar]
  24. Siddiqui S, Ghani S, Khan A A. PD-MAC:Design and Implementation of Polling Distribution-Mac for Improving Energy Efficiency of Wireless Sensor Networks[J]. International Journal of Wireless Information Networks, 2018, 25 (1): 1– 9 [Article] [CrossRef] [Google Scholar]
  25. Bao F, Chen I R, Chang M J, et al. Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection[J]. IEEE Trans on Network & Service Management, 2012, 9 (2): 169– 183 [Article] [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.