Revisiting trust based security techniques in wireless network

ISSN: 22783075
0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.

Abstract

Trust establishment is a very critical issue in wireless networks. It demonstrates the use of various complex algorithms involved in creating a trust model, applying the model on each node of the network and verifying that the model is not attacked or compromised by trusted nodes. Various researchers have applied multiple algorithms to perform this task, each of the proposed algorithm has their own pros and cons when applied to a real time wireless network. This paper revisits some of the standard algorithms and tries to compare them in terms of efficiency and reliability, so that the readers of this text can get a sufficient level of understanding on which algorithms can be applied to which set of network parameters in order to improve the overall trust quality of the network. We also propose some interesting observations from our study to further enhance trust level of these systems.

Cite

CITATION STYLE

APA

Vishwakarma, R., & Pardhi, P. (2019). Revisiting trust based security techniques in wireless network. International Journal of Innovative Technology and Exploring Engineering, 8(8 Special Issue 3), 538–544.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free