Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Zhijun Teng"'
Publikováno v:
IET Communications, Vol 18, Iss 1, Pp 55-62 (2024)
Abstract In order to solve the security problems caused by malicious nodes in wireless sensor networks, a TS‐BRS reputation model based on time series analysis is proposed in this paper. By using the time series analysis method, the matching analys
Externí odkaz:
https://doaj.org/article/ec11386a43b448b6b2005251cff3a231
Publikováno v:
Sensors, Vol 23, Iss 24, p 9709 (2023)
A sinkhole attack is characterized by low difficulty to launch, high destructive power, and difficulty to detect and defend. It is a common attack mode for wireless sensor networks. This paper proposes a sinkhole attack detection and defense strategy
Externí odkaz:
https://doaj.org/article/1dad2d6614c74f1a958d435cf0882e89
Publikováno v:
IEEE Access, Vol 8, Pp 149522-149530 (2020)
Wireless sensor network (WSN) works in a complex environment where it is difficult for people to reach or work. The openness of nodes leads to security threats vulnerable to various attacks. The trust and reputation model can be applied in WSN to red
Externí odkaz:
https://doaj.org/article/e9406505be9747758a8910d4042e8b74
Publikováno v:
IEEE Sensors Journal. 22:7361-7370
One of the key research topics to extend the network lifetime is choosing the suitable routing algorithm to increase the energy efficiency of nodes in information transfer. An improved EEABR algorithm called N-EEABR is proposed to address the problem
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::95776e51973fd88c4c4250915e157892
https://doi.org/10.21203/rs.3.rs-2206732/v1
https://doi.org/10.21203/rs.3.rs-2206732/v1
Autor:
Lingying Wang, Tianfeng Wang, Zhijie Xing, Qingfang Zhang, Xiaohui Niu, Yinshui Yu, Zhijun Teng, Jixiang Chen
Publikováno v:
Journal of Environmental Chemical Engineering. 11:109940
Publikováno v:
IEEE Wireless Communications Letters. 10:1613-1617
Wireless sensor network (WSN) nodes owing to their openness, are susceptible to several threats, one of which is dishonest recommendation attacks providing false trust values that favor the attacker. In this letter, a malicious node detection strateg
Publikováno v:
IAENG International Journal of Applied Mathematics. Aug2024, Vol. 54 Issue 8, p1574-1580. 7p.
Publikováno v:
Wireless Personal Communications. 117:1143-1162
In the wireless sensor network (WSN), nodes show a low forwarding rate under a poor-quality links environment and a resource-constrained state. The malicious nodes imitate this forwarding behavior, which can selectively forward date, eavesdropping, o
Publikováno v:
Xibei Gongye Daxue Xuebao, Vol 38, Iss 3, Pp 634-642 (2020)
Wireless sensor network (WSN) works in a complex environment. To interdict the malicious nodes which attacks the safety of network, such as interrupt attacks and selective forwarding attacks, based on TS-BRS reputation model, a model for malicious no