Design guidelines on trust management for underwater wireless sensor networks

R Zhu, A Boukerche, L Long… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
In recent years, significant advancements in wireless underwater communication and
acoustic sensor technology have spurred the exploration and utilization of the ocean's vast …

Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

Security and trust management in the internet of vehicles (IoV): Challenges and machine learning solutions

E Alalwany, I Mahgoub - Sensors, 2024 - mdpi.com
The Internet of Vehicles (IoV) is a technology that is connected to the public internet and is a
subnetwork of the Internet of Things (IoT) in which vehicles with sensors are connected to a …

ActiveTrust: Secure and trustable routing in wireless sensor networks

Y Liu, M Dong, K Ota, A Liu - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are increasingly being deployed in security-critical
applications. Because of their inherent resource-constrained characteristics, they are prone …

A survey on trust models in heterogeneous networks

J Wang, Z Yan, H Wang, T Li… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Heterogeneous networks (HetNets) merge different types of networks into an integrated
network system, which has become a hot research area in recent years towards next …

Cyberattack detection in wireless sensor networks using a hybrid feature reduction technique with AI and machine learning methods

MH Behiry, M Aly - Journal of Big Data, 2024 - Springer
This paper proposes an intelligent hybrid model that leverages machine learning and
artificial intelligence to enhance the security of Wireless Sensor Networks (WSNs) by …

A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks

T Khan, K Singh, M Abdel-Basset, HV Long… - Ieee …, 2019 - ieeexplore.ieee.org
With the wide applications of wireless sensor networks (WSNs) in various fields, such as
environment monitoring, battlefield surveillance, healthcare, and intrusion detection, trust …

Understanding graph-based trust evaluation in online social networks: Methodologies and challenges

W Jiang, G Wang, MZA Bhuiyan, J Wu - Acm Computing Surveys (Csur), 2016 - dl.acm.org
Online Social Networks (OSNs) are becoming a popular method of meeting people and
kee** in touch with friends. OSNs resort to trust evaluation models and algorithms to …

Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications

J Duan, D Gao, D Yang, CH Foh… - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
Trust evaluation plays an important role in securing wireless sensor networks (WSNs), which
is one of the most popular network technologies for the Internet of Things (IoT). The …