STATISTICS

Viewed998

Downloads680

A Dynamic Trust Evaluation and Prediction Model for WSN Based on Multiple Indexes
[1]ENG Zhijun,LI Meng,GU Jinliang,et al.A Dynamic Trust Evaluation and Prediction Model for WSN Based on Multiple Indexes[J].Journal of Zhengzhou University (Engineering Science),2023,44(03):78-84.[doi:10.13705/j.issn.1671-6833.2022.06.014]
Copy
References:
[1] 李建坡, 张庆华, 张展图, 等. 基于拥塞控制的无线传感器网络能耗优化路由算法[J]. 东北电力大学学报, 2020, 40(4): 69-74.LI J P, ZHANG Q H, ZHANG Z T, et al. Congestion control and energy optimization routing algorithm for wireless sensor networks[J]. Journal of Northeast Electric Power University, 2020, 40(4): 69-74.
[2] 张安琳, 张启坤, 黄道颖, 等. 基于CNN与BiGRU融合神经网络的入侵检测模型[J]. 郑州大学学报(工学版), 2022, 43(3): 37-43.ZHANG A L, ZHANG Q K, HUANG D Y, et al. Intrusion detection model based on CNN and BiGRU fused neural network[J]. Journal of Zhengzhou University (Engineering Science), 2022, 43(3): 37-43.
[3] FANG W D, ZHANG C L, SHI Z D, et al. BTRES: beta-based trust and reputation evaluation system for wireless sensor networks[J]. Journal of Network and Computer Applications, 2016, 59: 88-94.
[4] RAM P V, LATHA P. Fuzzy trust protocol for malicious node detection in wireless sensor networks[J]. Wireless Personal Communications, 2017, 94(4): 2549-2559.
[5] KURDI H, ALFARIES A, AL-ANAZI A, et al. A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments[J]. The Journal of Supercomputing, 2019, 75(7): 3534-3554.
[6] BUSI R V, VENKATARAMAN S, NEGI A. Communication and data trust for wireless sensor networks using D-S theory[J]. IEEE Sensors Journal, 2017, 17(12): 3921-3929.
[7] YIN X Q, LI S N. Trust evaluation model with entropy-based weight assignment for malicious node′s detection in wireless sensor networks[J]. EURASIP Journal on Wireless Communications and Networking, 2019, 2019: 198.
[8] 尹荣荣, 张文元, 杨绸绸, 等. 基于简化云与K/N投票的选择性转发攻击检测方法[J]. 电子与信息学报, 2020, 42(12): 2841-2848.YIN R R, ZHANG W Y, YANG C C, et al. A selective forwarding attack detection method based on simplified cloud and K/N voting model[J]. Journal of Electronics &Information Technology, 2020, 42(12): 2841-2848.
[9] 秦丹阳, 贾爽, 杨松祥, 等. 基于信任感知的无线传感器网络安全路由机制研究[J]. 通信学报, 2017, 38(10): 60-70.QIN D Y, JIA S, YANG S X, et al. Research on trust sensing based secure routing mechanism for wireless sensor network[J]. Journal on Communications, 2017, 38(10): 60-70.
[10] 滕志军, 杜春秋, 孙汇阳, 等. 融合节点信誉度和路径跳数的WSNs虫洞攻击检测策略[J]. 哈尔滨工业大学学报, 2021, 53(8): 64-71, 131.TENG Z J, DU C Q, SUN H Y, et al. A wormhole attack detection strategy integrating node creditworthiness and path hops in WSNs[J]. Journal of Harbin Institute of Technology, 2021, 53(8): 64-71, 131.
[11] 王秋惠. 基于空间自回归模型的电力系统中长期负荷特性分析与预测[J]. 东北电力大学学报, 2021, 41(3): 118-123.WANG Q H. The characteristic analysis and forecasting of mid-long term load based on spatial autoregressive model[J]. Journal of Northeast Electric Power University, 2021, 41(3): 118-123.
[12] 陈浩杰, 黄锦, 左兴权, 等. 基于宽度&深度学习的基站网络流量预测方法[J]. 郑州大学学报(工学版), 2022, 43(1): 7-13.CHEN H J, HUANG J, ZUO X Q, et al. Base Station network traffic prediction method based on wide &deep learning[J]. Journal of Zhengzhou University (Engineering Science), 2022, 43(1): 7-13.
[13] FENG R J, HAN X N, LIU Q, et al. A credible Bayesian-based trust management scheme for wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2015, 11(11): 678926.
[14] 叶正旺, 温涛, 刘振宇, 等. 基于信任模型的WSNs安全数据融合算法[J]. 东北大学学报(自然科学版), 2019, 40(6): 789-794.YE Z W, WEN T, LIU Z Y, et al. An algorithm of trust-based secure data aggregation for wireless sensor networks[J]. Journal of Northeastern University (Natural Science), 2019, 40(6): 789-794.
Similar References:
Memo

-

Last Update: 2023-05-09
Copyright © 2023 Editorial Board of Journal of Zhengzhou University (Engineering Science)