A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
On Communication Security in Wireless Ad-Hoc Sensor Networks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Trust network analysis with subjective logic
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
Investigating interactions of trust and interest similarity
Decision Support Systems
A survey of trust and reputation systems for online service provision
Decision Support Systems
A Bayesian Model for Event-based Trust
Electronic Notes in Theoretical Computer Science (ENTCS)
A Hybrid Trust Model for Enhancing Security in Distributed Systems
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Using sensorranks for in-network detection of faulty readings in wireless sensor networks
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
CHEMAS: Identify suspect nodes in selective forwarding attacks
Journal of Parallel and Distributed Computing
Online reputation systems: Design and strategic practices
Decision Support Systems
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
A reputation system for electronic negotiations
Computer Standards & Interfaces
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
Trust-based evolutionary game model assisting AODV routing against selfishness
Journal of Network and Computer Applications
Location-based trust for mobile user-generated content: applications, challenges and implementations
Proceedings of the 9th workshop on Mobile computing systems and applications
RepTrap: a novel attack on feedback-based reputation systems
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks
PDCAT '08 Proceedings of the 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies
A new method for intrusion detection on hierarchical wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
IEEE Transactions on Parallel and Distributed Systems
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Secure data aggregation in wireless sensor networks: A comprehensive overview
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
Secure and reliable data aggregation for wireless sensor networks
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
TRIMS, a privacy-aware trust and reputation model for identity management systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
B-Trust: bayesian trust framework for pervasive computing
iTrust'06 Proceedings of the 4th international conference on Trust Management
A trust model based on bayesian approach
AWIC'05 Proceedings of the Third international conference on Advances in Web Intelligence
Trust management for resilient wireless sensor networks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Sensor network security: a survey
IEEE Communications Surveys & Tutorials
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Editorial: Special issue on trusted computing and communications
Journal of Network and Computer Applications
An event-based packet dropping detection scheme for wireless mesh networks
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
How to achieve non-repudiation of origin with privacy protection in cloud computing
Journal of Computer and System Sciences
Hi-index | 0.00 |
As the trust issue in wireless sensor networks is emerging as one important factor in security schemes, it is necessary to analyze how to resist attacks with a trust scheme. In this paper we categorize various types of attacks and countermeasures related to trust schemes in WSNs. Furthermore, we provide the development of trust mechanisms, give a short summarization of classical trust methodologies and emphasize the challenges of trust scheme in WSNs. An extensive literature survey is presented by summarizing state-of-the-art trust mechanisms in two categories: secure routing and secure data. Based on the analysis of attacks and the existing research, an open field and future direction with trust mechanisms in WSNs is provided.