Trust establishment is a very critical issue in wireless networks. It demonstrates the use of various complex algorithms involved in creating a trust model, applying the model on each node of the network and verifying that the model is not attacked or compromised by trusted nodes. Various researchers have applied multiple algorithms to perform this task, each of the proposed algorithm has their own pros and cons when applied to a real time wireless network. This paper revisits some of the standard algorithms and tries to compare them in terms of efficiency and reliability, so that the readers of this text can get a sufficient level of understanding on which algorithms can be applied to which set of network parameters in order to improve the overall trust quality of the network. We also propose some interesting observations from our study to further enhance trust level of these systems.
CITATION STYLE
Vishwakarma, R., & Pardhi, P. (2019). Revisiting trust based security techniques in wireless network. International Journal of Innovative Technology and Exploring Engineering, 8(8 Special Issue 3), 538–544.
Mendeley helps you to discover research relevant for your work.