Evaluated reputation-based trust for WSN security
During the last years, Wireless Sensor Networks (WSNs) and its applications have obtained considerable momentum. However, security and power limits of WSNs are still important matters. Many existing approaches at most concentrate on cryptography to improve data authentication and integrity but thi...
| Main Authors: | Said Alkalbani, Abdullah, Md Tap, Abu Osman, Mantoro, Teddy |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Little Lion Scientific Islamabad Pakistan
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/40461/ http://irep.iium.edu.my/40461/1/Abdullah__Abu_Osman_Teddy_jatit-8Vol70No3.pdf |
Similar Items
Improved modified reputation-base trust for wireless sensor networks security
by: Alkalbani, Abdullah Said, et al.
Published: (2016)
by: Alkalbani, Abdullah Said, et al.
Published: (2016)
Energy consumption evaluation in trust and reputation models for wireless sensor networks
by: Alkalbani, Abdullah Said, et al.
Published: (2013)
by: Alkalbani, Abdullah Said, et al.
Published: (2013)
Improving the lifetime of wireless sensor networks based on routing power factor
by: Alkalbani, Abdullah Said, et al.
Published: (2012)
by: Alkalbani, Abdullah Said, et al.
Published: (2012)
Securing WSN with lightweight resource-efficient schemes
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Routing protocol design for secure WSN: Review and open research issues
by: Md Zin, Shazana, et al.
Published: (2014)
by: Md Zin, Shazana, et al.
Published: (2014)
Traffic management system based on wsn in Kuwait: an initial design
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Metrics evaluation for context-aware computing
by: Mantoro, Teddy
Published: (2009)
by: Mantoro, Teddy
Published: (2009)
Distance based thresholds for 2-tier relay nodes selection in WSN
by: Azamuddin, Abdul Rahman, et al.
Published: (2019)
by: Azamuddin, Abdul Rahman, et al.
Published: (2019)
WSN based sensing model for smart crowd movement with identification: a conceptual model
by: Nawaz, Naeem A., et al.
Published: (2016)
by: Nawaz, Naeem A., et al.
Published: (2016)
Performance analysis of MAC protocol for cooperative MIMO transmissions in WSN
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
by: Ahmad, Mohd Riduan, et al.
Published: (2008)
A secure energy-efficient routing protocol for WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Reinforcement learning-based trust and reputation model for spectrum leasing in cognitive radio networks
by: Ling, Mee Hong *, et al.
Published: (2013)
by: Ling, Mee Hong *, et al.
Published: (2013)
Indoor localization based on Received Signal Strength Indicator (RSSI) in Wireless Sensor Network (WSN)
by: Nur Aina Auni, Ramlan
Published: (2019)
by: Nur Aina Auni, Ramlan
Published: (2019)
The potential of fuzzy evaluation approach in information systems.
by: Md. Tap, Abu Osman
Published: (2011)
by: Md. Tap, Abu Osman
Published: (2011)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
Improved K-means clustering and adaptive distance threshold for energy reduction in WSN-IoTs
by: Azamuddin, Ab Rahman, et al.
Published: (2025)
by: Azamuddin, Ab Rahman, et al.
Published: (2025)
The Effect of Security and Privacy Perceptions on Customers’ Trust to Accept Internet Banking Services: An Extension of TAM
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
A framework for heuristic evaluation on Islamic websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
Fuzzy computing with expressions for evaluating fonts styles on children websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
TrustData: trustworthy and secured data collection for event detection in industrial cyber-physical system (In Press)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
iLukBa ver 1.1 : indoor user location system with speech recognition for mobile users
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
Unveiling the support of 3D representation in mobile devices for pedestrians navigation aid
by: Abubakar, Adamu, et al.
Published: (2012)
by: Abubakar, Adamu, et al.
Published: (2012)
Web application development process
by: Ibrahim, Adamu Abubakar, et al.
Published: (2011)
by: Ibrahim, Adamu Abubakar, et al.
Published: (2011)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
Quality rating of Islamic websites features : a single-user evaluation
by: Md. Tap, Abu Osman, et al.
Published: (2010)
by: Md. Tap, Abu Osman, et al.
Published: (2010)
BitTorrent: extra-locality P2P approach for grid content distribution networks
by: Mantoro, Teddy, et al.
Published: (2009)
by: Mantoro, Teddy, et al.
Published: (2009)
A web based survey using fuzzy set model
by: Ayu, Media Anugerah, et al.
Published: (2010)
by: Ayu, Media Anugerah, et al.
Published: (2010)
Enhancing security on IPv6 neighbor discovery using trust-ND.
by: Chong , Yung Wey
Published: (2017)
by: Chong , Yung Wey
Published: (2017)
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
by: Sinnanaidu, Subba Rao
Published: (2004)
by: Sinnanaidu, Subba Rao
Published: (2004)
The web: its utilisation, evaluation and security
Published: (2011)
Published: (2011)
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
eSurvia : a web-based survey tool using fuzzy conjoint analysis
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
On the security of golden cryptosystems
by: Tahghighi, Muhammad, et al.
Published: (2012)
by: Tahghighi, Muhammad, et al.
Published: (2012)
Linking consumer trust perception in constructing an e-commerce trust model
by: Che Hussin, Ab. Razak, et al.
Published: (2008)
by: Che Hussin, Ab. Razak, et al.
Published: (2008)
Fuzzy TOPSIS method in the selection of Investment Boards by incorporating operational risks
by: Madi, Elissa Nadia, et al.
Published: (2011)
by: Madi, Elissa Nadia, et al.
Published: (2011)
An evaluation of security features for preventing illegal distribution of digital content using quantitative methods
by: Muhammad Isma Farhan, Mohd Raza, et al.
Published: (2025)
by: Muhammad Isma Farhan, Mohd Raza, et al.
Published: (2025)
Kulliyyah of Information and Communication Technology (KICT) postgraduate system
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Similar Items
-
Improved modified reputation-base trust for wireless sensor networks security
by: Alkalbani, Abdullah Said, et al.
Published: (2016) -
Energy consumption evaluation in trust and reputation models for wireless sensor networks
by: Alkalbani, Abdullah Said, et al.
Published: (2013) -
Improving the lifetime of wireless sensor networks based on routing power factor
by: Alkalbani, Abdullah Said, et al.
Published: (2012) -
Securing WSN with lightweight resource-efficient schemes
by: Pathan, Al-Sakib Khan
Published: (2011) -
Routing protocol design for secure WSN: Review and open research issues
by: Md Zin, Shazana, et al.
Published: (2014)