Trust-aware and improved density peaks clustering algorithm for fast and secure models in wireless sensor networks

Many trust-based models for wireless sensor networks do not account for trust attacks, which are destructive phenomena that undermine the security and reliability of these models. Therefore, a trust-based fast security model fused with an improved density peaks clustering algorithm (TFSM-DPC) is pro...

Full description

Saved in:
Bibliographic Details
Published in:Pervasive and mobile computing Vol. 105; p. 101993
Main Authors: Han, Youjia, Wang, Huibin, Li, Yueheng, Zhang, Lili
Format: Journal Article
Language:English
Published: Elsevier B.V 01.12.2024
Subjects:
ISSN:1574-1192
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Many trust-based models for wireless sensor networks do not account for trust attacks, which are destructive phenomena that undermine the security and reliability of these models. Therefore, a trust-based fast security model fused with an improved density peaks clustering algorithm (TFSM-DPC) is proposed to quickly identify trust attacks in this paper. First, when calculating direct trust values, TFSM-DPC designs the adaptive penalty factors based on the state of received and sent packets and behaviors, and introduces the volatilization factors to reduce the effect of historical trust values. Second, TFSM-DPC improved density peaks clustering (DPC) algorithm to evaluate the trustworthiness of each recommendation value, thus filtering malicious recommendations before calculating the indirect trust values. Moreover, to filter two types of recommendations, the improved DPC algorithm incorporates artificial benchmark data along with trust values recommended by neighbors as input data. Finally, based on the relationship between direct trust and indirect trust, a secure formula for calculate the comprehensive trust is designed. Therefore, the proposed TFSM-DPC can improve the accuracy of trust evaluation and speed up the identification of malicious nodes. Simulation results show that TFSM-DPC can effectively identify on-off, bad-mouth and collusion attacks, and improve the speed of excluding malicious nodes from the network, compared to other trust-based algorithms.
AbstractList Many trust-based models for wireless sensor networks do not account for trust attacks, which are destructive phenomena that undermine the security and reliability of these models. Therefore, a trust-based fast security model fused with an improved density peaks clustering algorithm (TFSM-DPC) is proposed to quickly identify trust attacks in this paper. First, when calculating direct trust values, TFSM-DPC designs the adaptive penalty factors based on the state of received and sent packets and behaviors, and introduces the volatilization factors to reduce the effect of historical trust values. Second, TFSM-DPC improved density peaks clustering (DPC) algorithm to evaluate the trustworthiness of each recommendation value, thus filtering malicious recommendations before calculating the indirect trust values. Moreover, to filter two types of recommendations, the improved DPC algorithm incorporates artificial benchmark data along with trust values recommended by neighbors as input data. Finally, based on the relationship between direct trust and indirect trust, a secure formula for calculate the comprehensive trust is designed. Therefore, the proposed TFSM-DPC can improve the accuracy of trust evaluation and speed up the identification of malicious nodes. Simulation results show that TFSM-DPC can effectively identify on-off, bad-mouth and collusion attacks, and improve the speed of excluding malicious nodes from the network, compared to other trust-based algorithms.
ArticleNumber 101993
Author Li, Yueheng
Zhang, Lili
Wang, Huibin
Han, Youjia
Author_xml – sequence: 1
  givenname: Youjia
  orcidid: 0000-0003-2154-3234
  surname: Han
  fullname: Han, Youjia
– sequence: 2
  givenname: Huibin
  surname: Wang
  fullname: Wang, Huibin
  email: hbwang@hhu.edu.cn
– sequence: 3
  givenname: Yueheng
  surname: Li
  fullname: Li, Yueheng
– sequence: 4
  givenname: Lili
  surname: Zhang
  fullname: Zhang, Lili
BookMark eNp9kL9uwjAQhz1QqUD7Ap38AqG245BE6lKh_pOQutDZMvaZOiR2ZBsQb9-kdOrALSfd_b6T7puhifMOEHqgZEEJXT42i75TzYIRxsdBXecTNKVFyTNKa3aLZjE2hHDKSzJFYRMOMWXyJANg6TS2XR_8ETTW4KJNZ9yD3Ees2iEGwbodlu3OB5u-O2x8wEbG9AtGUIfhRuc1tBFbh082QAsxDhsXh6SDdPJhH-_QjZFthPu_Pkdfry-b1Xu2_nz7WD2vM5UTkrIyr0xZGLLlSsmKM7bdgiyG4tpQDTrnRlV5zonirF6WtaFMA9QMakOKsqb5HLHLXRV8jAGM6IPtZDgLSsRoSjRiNCVGU-JiaoCqf5CySSbrXQrSttfRpws6_A9HC0FEZcEp0IMIlYT29hr-A4AMi4g
CitedBy_id crossref_primary_10_1109_JSEN_2025_3570812
crossref_primary_10_3390_s25072056
crossref_primary_10_3390_app15063075
Cites_doi 10.1109/TII.2019.2961340
10.1109/JIOT.2021.3081422
10.1016/j.comcom.2023.08.011
10.1109/ACCESS.2019.2904544
10.1007/s11276-022-02991-1
10.1016/j.adhoc.2020.102215
10.1007/s11277-024-11504-6
10.1007/s11227-021-04092-w
10.1016/j.comnet.2021.108250
10.1007/s11276-024-03687-4
10.1109/ACCESS.2017.2786944
10.1007/s12652-020-02638-z
10.1109/ACCESS.2019.2916340
10.1007/s11276-019-02129-w
10.1109/ACCESS.2017.2706973
10.3390/s19061467
10.1109/JSEN.2017.2699561
10.1007/s11042-019-7585-5
10.3390/app12042045
10.3390/s22020411
10.1007/s13369-017-3052-7
10.3390/s150307040
10.1007/s11277-024-11263-4
10.1016/j.future.2019.02.004
10.1155/2022/3449428
10.1007/s11277-022-09541-0
10.1109/JIOT.2021.3102578
10.1109/JSEN.2022.3152841
10.1007/s11276-020-02271-w
10.1002/dac.5664
10.1007/s11276-018-01916-1
10.3390/s20010165
10.1002/ett.4248
ContentType Journal Article
Copyright 2024
Copyright_xml – notice: 2024
DBID AAYXX
CITATION
DOI 10.1016/j.pmcj.2024.101993
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
ExternalDocumentID 10_1016_j_pmcj_2024_101993
S1574119224001184
GroupedDBID --K
--M
.~1
0R~
123
1B1
1~.
1~5
4.4
457
4G.
5VS
7-5
71M
8P~
AACTN
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXKI
AAXUO
AAYFN
ABBOA
ABFRF
ABJNI
ABMAC
ABXDB
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACRPL
ACZNC
ADBBV
ADEZE
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFJKZ
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJOXV
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
RIG
ROL
RPZ
SCC
SDF
SDG
SES
SPC
SPCBC
SST
SSV
SSZ
T5K
UNMZH
~G-
9DU
AATTM
AAYWO
AAYXX
ABWVN
ACLOT
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFPUW
AIGII
AIIUN
AKBMS
AKYEP
ANKPU
APXCP
CITATION
EFKBS
EFLBG
~HD
ID FETCH-LOGICAL-c300t-738f75f0b4cca8422bbea55554df1ded34fc83340c429679f12dee92e9f057913
ISICitedReferencesCount 3
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001339225100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1574-1192
IngestDate Sat Nov 29 01:32:45 EST 2025
Tue Nov 18 21:50:03 EST 2025
Wed Dec 04 16:46:46 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Security model
Density peaks clustering algorithm
Wireless sensor networks
Trust attacks
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c300t-738f75f0b4cca8422bbea55554df1ded34fc83340c429679f12dee92e9f057913
ORCID 0000-0003-2154-3234
ParticipantIDs crossref_primary_10_1016_j_pmcj_2024_101993
crossref_citationtrail_10_1016_j_pmcj_2024_101993
elsevier_sciencedirect_doi_10_1016_j_pmcj_2024_101993
PublicationCentury 2000
PublicationDate December 2024
2024-12-00
PublicationDateYYYYMMDD 2024-12-01
PublicationDate_xml – month: 12
  year: 2024
  text: December 2024
PublicationDecade 2020
PublicationTitle Pervasive and mobile computing
PublicationYear 2024
Publisher Elsevier B.V
Publisher_xml – sequence: 0
  name: Elsevier B.V
References SureshKumar, Vimala (bib0032) 2021; 197
Fang, Zhang, Chen (bib0031) Jan. 2021; 14
Fang, Zhang, Chen (bib0036) Jul. 2020; 26
Sahoo, Ray, Sarkar (bib0035) Dec. 2018; 43
Reddy, Negi, Venkataraman (bib0038) Jun. 2017; 17
Zhou, Shao, Sun (bib0039) 2015; 11
Saidi, Benahmed, Seddiki (bib0011) Sep. 2020; 106
Janarthanan, Srinivasan (bib0004) Oct. 2024; 37
Ramathilagam, Vijayalakshmi (bib0021) Jul. 2024; 137
Bhargava, Verma (bib0030) Jun. 2021; 32
Fang, Zhang, Chen (bib0014) Sep. 2020; 2020
Ramesh, Yaashuwanth (bib0028) Apr. 2020; 79
Saidi (bib0037) May. 2024; 30
Althubiti (bib0008) Apr. 2022; 2022
Wu, Liang (bib0018) Apr. 2021; 72
Din, Bano, Awan (bib0022) Feb. 2021; 10
Anwar, Zainal, Outay (bib0019) Jul. 2019; 96
Yu, Li, Li (bib0027) Mar. 2022; 13
Manoharan, Subramani, Ramu (bib0001) May. 2024; 43
Kumar, Tripathi, Agrawal (bib0010) 2022; 28
Awan, Din, Almogren (bib0016) Jun. 2019; 7
Alrahhal, Jamous, Ramadan (bib0015) Feb. 2022; 12
Zhao, Huang, Xiong (bib0034) Apr. 2019; 7
Refaee, Shamsudheen (bib0026) Mar. 2022; 78
Awan, Javaid, Ullah (bib0003) Jan. 2022; 22
Xia, Wei, Zhang (bib0005) Sep. 2022; 2022
Sun, Li (bib0040) Mar. 2018; 6
Bin-Yahya (bib0017) Nov. 2022; 9
Teng (bib0020) Apr. 2022; 22
Zheng, Gong, Zhang (bib0006) Feb. 2021; 2021
Feroz Khan (bib0025) Jul. 2024; 137
Alnumay, Ghosh, Chatterjee (bib0024) Mar. 2019; 19
Hong, Shao, Liao (bib0012) Oct. 2019; 25
Anitha, Bapu, Kuppusamy (bib0013) Jul. 2022; 125
Qin, Yang, Jia (bib0041) Jul. 2017; 5
Altuwairiqi (bib0002) Jan. 2024; 214
Cao, Zhao, Gu (bib0009) 2020; 16
Rodrigues, John (bib0023) Jul. 2020; 26
Ishmanov, Kim, Nam (bib0033) Mar. 2015; 15
Yuan (bib0007) May. 2022; 2022
Shi, Qin, Ding, Xie, Zheng, Song (bib0029) Jan. 2020; 20
Zhou (10.1016/j.pmcj.2024.101993_bib0039) 2015; 11
Xia (10.1016/j.pmcj.2024.101993_bib0005) 2022; 2022
Ishmanov (10.1016/j.pmcj.2024.101993_bib0033) 2015; 15
Reddy (10.1016/j.pmcj.2024.101993_bib0038) 2017; 17
Awan (10.1016/j.pmcj.2024.101993_bib0003) 2022; 22
Wu (10.1016/j.pmcj.2024.101993_bib0018) 2021; 72
Yuan (10.1016/j.pmcj.2024.101993_bib0007) 2022; 2022
Alnumay (10.1016/j.pmcj.2024.101993_bib0024) 2019; 19
Saidi (10.1016/j.pmcj.2024.101993_bib0037) 2024; 30
Teng (10.1016/j.pmcj.2024.101993_bib0020) 2022; 22
Zhao (10.1016/j.pmcj.2024.101993_bib0034) 2019; 7
Zheng (10.1016/j.pmcj.2024.101993_bib0006) 2021; 2021
SureshKumar (10.1016/j.pmcj.2024.101993_bib0032) 2021; 197
Qin (10.1016/j.pmcj.2024.101993_bib0041) 2017; 5
Rodrigues (10.1016/j.pmcj.2024.101993_bib0023) 2020; 26
Yu (10.1016/j.pmcj.2024.101993_bib0027) 2022; 13
Ramathilagam (10.1016/j.pmcj.2024.101993_bib0021) 2024; 137
Anitha (10.1016/j.pmcj.2024.101993_bib0013) 2022; 125
Fang (10.1016/j.pmcj.2024.101993_bib0014) 2020; 2020
Din (10.1016/j.pmcj.2024.101993_bib0022) 2021; 10
Fang (10.1016/j.pmcj.2024.101993_bib0036) 2020; 26
Cao (10.1016/j.pmcj.2024.101993_bib0009) 2020; 16
Bin-Yahya (10.1016/j.pmcj.2024.101993_bib0017) 2022; 9
Altuwairiqi (10.1016/j.pmcj.2024.101993_bib0002) 2024; 214
Manoharan (10.1016/j.pmcj.2024.101993_bib0001) 2024; 43
Janarthanan (10.1016/j.pmcj.2024.101993_bib0004) 2024; 37
Ramesh (10.1016/j.pmcj.2024.101993_bib0028) 2020; 79
Refaee (10.1016/j.pmcj.2024.101993_bib0026) 2022; 78
Althubiti (10.1016/j.pmcj.2024.101993_bib0008) 2022; 2022
Alrahhal (10.1016/j.pmcj.2024.101993_bib0015) 2022; 12
Kumar (10.1016/j.pmcj.2024.101993_bib0010) 2022; 28
Feroz Khan (10.1016/j.pmcj.2024.101993_bib0025) 2024; 137
Fang (10.1016/j.pmcj.2024.101993_bib0031) 2021; 14
Sun (10.1016/j.pmcj.2024.101993_bib0040) 2018; 6
Shi (10.1016/j.pmcj.2024.101993_bib0029) 2020; 20
Saidi (10.1016/j.pmcj.2024.101993_bib0011) 2020; 106
Bhargava (10.1016/j.pmcj.2024.101993_bib0030) 2021; 32
Sahoo (10.1016/j.pmcj.2024.101993_bib0035) 2018; 43
Hong (10.1016/j.pmcj.2024.101993_bib0012) 2019; 25
Awan (10.1016/j.pmcj.2024.101993_bib0016) 2019; 7
Anwar (10.1016/j.pmcj.2024.101993_bib0019) 2019; 96
References_xml – volume: 37
  start-page: e5664
  year: Oct. 2024
  ident: bib0004
  article-title: Multi-objective cluster head-based energy aware routing using optimized auto-metric graph neural network for secured data aggregation in Wireless Sensor Network
  publication-title: Int. J. Commun. Syst.
– volume: 125
  start-page: 63
  year: Jul. 2022
  end-page: 86
  ident: bib0013
  article-title: FEBSRA: fuzzy trust based energy aware balanced secure routing algorithm for secured communications in WSNs
  publication-title: Wirel. Pers. A commu. Int. J.
– volume: 10
  start-page: 2776
  year: Feb. 2021
  end-page: 2783
  ident: bib0022
  article-title: LightTrust: lightweight trust management for edge devices in industrial internet of things
  publication-title: IEEE Internet Things J.
– volume: 106
  start-page: 102215.1
  year: Sep. 2020
  end-page: 102215.24
  ident: bib0011
  article-title: Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks
  publication-title: Ad Hoc Netw.
– volume: 2022
  start-page: 9
  year: Sep. 2022
  ident: bib0005
  article-title: Review on security issues and applications of trust mechanism in wireless sensor networks
  publication-title: Comput. Intell. Neurosci.
– volume: 26
  start-page: 3553
  year: Jul. 2020
  end-page: 3568
  ident: bib0023
  article-title: Joint trust: an approach for trust-aware routing in WSN
  publication-title: Wirel. Netw.
– volume: 6
  start-page: 4725
  year: Mar. 2018
  end-page: 4741
  ident: bib0040
  article-title: A Comprehensive trust-aware routing protocol with multi-attributes for WSNs
  publication-title: IEEE Access
– volume: 7
  start-page: 33859
  year: Apr. 2019
  end-page: 33869
  ident: bib0034
  article-title: An effective exponential-based trust and reputation evaluation system in wireless sensor networks
  publication-title: IEEE Access.
– volume: 2021
  start-page: 10
  year: Feb. 2021
  ident: bib0006
  article-title: Dynamic network security mechanism based on trust management in wireless sensor networks
  publication-title: Wirel. Commun. Mob. Com.
– volume: 14
  year: Jan. 2021
  ident: bib0031
  article-title: MSCR: multidimensional secure clustered routing scheme in hierarchical wireless sensor networks
  publication-title: EURASIP J. Wirel. Commun. Netw.
– volume: 30
  start-page: 2589
  year: May. 2024
  end-page: 2615
  ident: bib0037
  article-title: An adaptive trust system for misbehavior detection in wireless sensor networks
  publication-title: Wirel. Netw.
– volume: 12
  start-page: 2045
  year: Feb. 2022
  ident: bib0015
  article-title: Utilising acknowledge for the trust in wireless sensor networks
  publication-title: Appl. Sci.
– volume: 17
  start-page: 3921
  year: Jun. 2017
  end-page: 3929
  ident: bib0038
  article-title: communication and data trust for wireless sensor networks using D–S theory
  publication-title: IEEE Sens. J.
– volume: 96
  start-page: 605
  year: Jul. 2019
  end-page: 616
  ident: bib0019
  article-title: BTEM: belief based trust evaluation mechanism for wireless sensor networks
  publication-title: Future Gener. Comput. Syst.
– volume: 22
  start-page: 411
  year: Jan. 2022
  ident: bib0003
  article-title: Blockchain based secure routing and trust management in wireless sensor networks
  publication-title: Sensors
– volume: 22
  start-page: 7361
  year: Apr. 2022
  end-page: 7370
  ident: bib0020
  article-title: A wormhole attack detection algorithm integrated with the node trust optimization model in WSNs
  publication-title: IEEE Sens. J.
– volume: 15
  start-page: 7040
  year: Mar. 2015
  end-page: 7061
  ident: bib0033
  article-title: A robust trust establishment scheme for wireless sensor networks
  publication-title: Sensors
– volume: 28
  start-page: 2913
  year: 2022
  end-page: 2936
  ident: bib0010
  article-title: Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks
  publication-title: Wirel. Netw.
– volume: 197
  year: 2021
  ident: bib0032
  article-title: Energy efficient routing protocol using exponentially-ant lion whale optimization algorithm in wireless sensor networks
  publication-title: Comput. Netw.
– volume: 2022
  year: Apr. 2022
  ident: bib0008
  article-title: A trust aware authentication scheme for wireless sensor networks optimized by salp swarm optimization and deep belief networks
  publication-title: Math. Probl. Eng.
– volume: 5
  start-page: 9599
  year: Jul. 2017
  end-page: 9609
  ident: bib0041
  article-title: Research on trust sensing based secure routing mechanism for wireless sensor network
  publication-title: IEEE Access
– volume: 43
  year: May. 2024
  ident: bib0001
  article-title: An optimal energy efficient routing in WSN using adaptive entropy bald eagle search optimization and density based adaptive soft clustering
  publication-title: Sustain. Comput. Inform. Syst.
– volume: 214
  start-page: 244
  year: Jan. 2024
  end-page: 259
  ident: bib0002
  article-title: An optimized multi-hop routing protocol for wireless sensor network using improved honey badger optimization algorithm for efficient and secure QoS
  publication-title: Comput. Commun.
– volume: 32
  start-page: e4248
  year: Jun. 2021
  ident: bib0030
  article-title: DEIT: dempster Shafer Theory-based edge-centric internet of things-specific trust model
  publication-title: Trans. Emerg. Telecommun. Technol.
– volume: 26
  start-page: 3169
  year: Jul. 2020
  end-page: 3182
  ident: bib0036
  article-title: TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing
  publication-title: Wirel. Netw.
– volume: 137
  start-page: 671
  year: Jul. 2024
  end-page: 684
  ident: bib0021
  article-title: Customizable fuzzy-neuro inference system attack detection based on trust for mobile wireless sensor networks
  publication-title: Wirel. Pers. Commun.
– volume: 7
  start-page: 62095
  year: Jun. 2019
  end-page: 62106
  ident: bib0016
  article-title: Robusttrust–a pro-privacy robust distributed trust management mechanism for internet of things
  publication-title: IEEE Access.
– volume: 2020
  start-page: 20
  year: Sep. 2020
  ident: bib0014
  article-title: Trust-based attack and defense in wireless sensor networks: a survey
  publication-title: Wirel. Commu. Mob. Com.
– volume: 13
  start-page: 1405
  year: Mar. 2022
  end-page: 1417
  ident: bib0027
  article-title: Trust-based secure directed diffusion routing protocol in WSN
  publication-title: J. Ambient Intell. Humaniz. Comput.
– volume: 2022
  start-page: 9
  year: May. 2022
  ident: bib0007
  article-title: A Secure routing protocol for wireless sensor energy network based on trust management
  publication-title: Wirel. Commun. Mob. Com.
– volume: 20
  start-page: 165
  year: Jan. 2020
  ident: bib0029
  article-title: Information-aware secure routing in wireless sensor networks
  publication-title: Sensors
– volume: 19
  start-page: 1467
  year: Mar. 2019
  ident: bib0024
  article-title: A trust-based predictive model for mobile ad hoc network in internet of things
  publication-title: Sensors
– volume: 16
  start-page: 5309
  year: 2020
  end-page: 5316
  ident: bib0009
  article-title: Security-aware industrial wireless sensor network deployment optimization
  publication-title: IEEE Trans. Industr. Inform.
– volume: 78
  start-page: 5610
  year: Mar. 2022
  end-page: 5625
  ident: bib0026
  article-title: Trust- and energy-aware cluster head selection in a UAV-based wireless sensor network using Fit-FCM
  publication-title: J. Supercomput.
– volume: 11
  start-page: 5385
  year: 2015
  end-page: 5392
  ident: bib0039
  article-title: A trust evaluation model based on bad behaviors for wireless sensor networks
  publication-title: J. Comput. Inf. Syst.
– volume: 9
  start-page: 22230
  year: Nov. 2022
  end-page: 22245
  ident: bib0017
  article-title: Securing software-defined wsns communication via trust management
  publication-title: IEEE Internet Things J.
– volume: 43
  start-page: 7229
  year: Dec. 2018
  end-page: 7251
  ident: bib0035
  article-title: Guard against trust management vulnerabilities in wireless sensor network
  publication-title: Arab. J. Sci. Eng.
– volume: 72
  start-page: 1
  year: Apr. 2021
  end-page: 16
  ident: bib0018
  article-title: A blockchain-based trust management method for internet of things
  publication-title: Pervasive Mob. Comput.
– volume: 137
  start-page: 2397
  year: Jul. 2024
  end-page: 2407
  ident: bib0025
  article-title: An Enhanced multi attribute based trusted attack resistance (embtr) for the secure routing of sensor nodes in wireless sensor network
  publication-title: Wirel. Pers. Commun.
– volume: 79
  start-page: 10157
  year: Apr. 2020
  end-page: 10176
  ident: bib0028
  article-title: Enhanced approach using trust based decision making for secured wireless streaming video sensor networks
  publication-title: Multimed. Tools Appl.
– volume: 25
  start-page: 3805
  year: Oct. 2019
  end-page: 3823
  ident: bib0012
  article-title: A secure routing protocol with regional partitioned clustering and Beta trust management in smart home
  publication-title: Wirel. Netw.
– volume: 2022
  start-page: 9
  year: 2022
  ident: 10.1016/j.pmcj.2024.101993_bib0007
  article-title: A Secure routing protocol for wireless sensor energy network based on trust management
  publication-title: Wirel. Commun. Mob. Com.
– volume: 16
  start-page: 5309
  issue: 8
  year: 2020
  ident: 10.1016/j.pmcj.2024.101993_bib0009
  article-title: Security-aware industrial wireless sensor network deployment optimization
  publication-title: IEEE Trans. Industr. Inform.
  doi: 10.1109/TII.2019.2961340
– volume: 2022
  issue: 1
  year: 2022
  ident: 10.1016/j.pmcj.2024.101993_bib0008
  article-title: A trust aware authentication scheme for wireless sensor networks optimized by salp swarm optimization and deep belief networks
  publication-title: Math. Probl. Eng.
– volume: 10
  start-page: 2776
  issue: 4
  year: 2021
  ident: 10.1016/j.pmcj.2024.101993_bib0022
  article-title: LightTrust: lightweight trust management for edge devices in industrial internet of things
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2021.3081422
– volume: 214
  start-page: 244
  year: 2024
  ident: 10.1016/j.pmcj.2024.101993_bib0002
  article-title: An optimized multi-hop routing protocol for wireless sensor network using improved honey badger optimization algorithm for efficient and secure QoS
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2023.08.011
– volume: 7
  start-page: 33859
  year: 2019
  ident: 10.1016/j.pmcj.2024.101993_bib0034
  article-title: An effective exponential-based trust and reputation evaluation system in wireless sensor networks
  publication-title: IEEE Access.
  doi: 10.1109/ACCESS.2019.2904544
– volume: 28
  start-page: 2913
  issue: 8
  year: 2022
  ident: 10.1016/j.pmcj.2024.101993_bib0010
  article-title: Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks
  publication-title: Wirel. Netw.
  doi: 10.1007/s11276-022-02991-1
– volume: 106
  start-page: 102215.1
  year: 2020
  ident: 10.1016/j.pmcj.2024.101993_bib0011
  article-title: Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks
  publication-title: Ad Hoc Netw.
  doi: 10.1016/j.adhoc.2020.102215
– volume: 137
  start-page: 2397
  issue: 4
  year: 2024
  ident: 10.1016/j.pmcj.2024.101993_bib0025
  article-title: An Enhanced multi attribute based trusted attack resistance (embtr) for the secure routing of sensor nodes in wireless sensor network
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-024-11504-6
– volume: 78
  start-page: 5610
  issue: 4
  year: 2022
  ident: 10.1016/j.pmcj.2024.101993_bib0026
  article-title: Trust- and energy-aware cluster head selection in a UAV-based wireless sensor network using Fit-FCM
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-021-04092-w
– volume: 197
  year: 2021
  ident: 10.1016/j.pmcj.2024.101993_bib0032
  article-title: Energy efficient routing protocol using exponentially-ant lion whale optimization algorithm in wireless sensor networks
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2021.108250
– volume: 30
  start-page: 2589
  issue: 4
  year: 2024
  ident: 10.1016/j.pmcj.2024.101993_bib0037
  article-title: An adaptive trust system for misbehavior detection in wireless sensor networks
  publication-title: Wirel. Netw.
  doi: 10.1007/s11276-024-03687-4
– volume: 6
  start-page: 4725
  year: 2018
  ident: 10.1016/j.pmcj.2024.101993_bib0040
  article-title: A Comprehensive trust-aware routing protocol with multi-attributes for WSNs
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2786944
– volume: 43
  year: 2024
  ident: 10.1016/j.pmcj.2024.101993_bib0001
  article-title: An optimal energy efficient routing in WSN using adaptive entropy bald eagle search optimization and density based adaptive soft clustering
  publication-title: Sustain. Comput. Inform. Syst.
– volume: 13
  start-page: 1405
  issue: 3
  year: 2022
  ident: 10.1016/j.pmcj.2024.101993_bib0027
  article-title: Trust-based secure directed diffusion routing protocol in WSN
  publication-title: J. Ambient Intell. Humaniz. Comput.
  doi: 10.1007/s12652-020-02638-z
– volume: 7
  start-page: 62095
  year: 2019
  ident: 10.1016/j.pmcj.2024.101993_bib0016
  article-title: Robusttrust–a pro-privacy robust distributed trust management mechanism for internet of things
  publication-title: IEEE Access.
  doi: 10.1109/ACCESS.2019.2916340
– volume: 26
  start-page: 3169
  issue: 11
  year: 2020
  ident: 10.1016/j.pmcj.2024.101993_bib0036
  article-title: TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing
  publication-title: Wirel. Netw.
  doi: 10.1007/s11276-019-02129-w
– volume: 5
  start-page: 9599
  issue: 99
  year: 2017
  ident: 10.1016/j.pmcj.2024.101993_bib0041
  article-title: Research on trust sensing based secure routing mechanism for wireless sensor network
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2706973
– volume: 19
  start-page: 1467
  issue: 6
  year: 2019
  ident: 10.1016/j.pmcj.2024.101993_bib0024
  article-title: A trust-based predictive model for mobile ad hoc network in internet of things
  publication-title: Sensors
  doi: 10.3390/s19061467
– volume: 17
  start-page: 3921
  issue: 12
  year: 2017
  ident: 10.1016/j.pmcj.2024.101993_bib0038
  article-title: communication and data trust for wireless sensor networks using D–S theory
  publication-title: IEEE Sens. J.
  doi: 10.1109/JSEN.2017.2699561
– volume: 79
  start-page: 10157
  issue: 15
  year: 2020
  ident: 10.1016/j.pmcj.2024.101993_bib0028
  article-title: Enhanced approach using trust based decision making for secured wireless streaming video sensor networks
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-019-7585-5
– volume: 12
  start-page: 2045
  issue: 4
  year: 2022
  ident: 10.1016/j.pmcj.2024.101993_bib0015
  article-title: Utilising acknowledge for the trust in wireless sensor networks
  publication-title: Appl. Sci.
  doi: 10.3390/app12042045
– volume: 14
  issue: 10
  year: 2021
  ident: 10.1016/j.pmcj.2024.101993_bib0031
  article-title: MSCR: multidimensional secure clustered routing scheme in hierarchical wireless sensor networks
  publication-title: EURASIP J. Wirel. Commun. Netw.
– volume: 2020
  start-page: 20
  year: 2020
  ident: 10.1016/j.pmcj.2024.101993_bib0014
  article-title: Trust-based attack and defense in wireless sensor networks: a survey
  publication-title: Wirel. Commu. Mob. Com.
– volume: 22
  start-page: 411
  issue: 2
  year: 2022
  ident: 10.1016/j.pmcj.2024.101993_bib0003
  article-title: Blockchain based secure routing and trust management in wireless sensor networks
  publication-title: Sensors
  doi: 10.3390/s22020411
– volume: 43
  start-page: 7229
  issue: 12
  year: 2018
  ident: 10.1016/j.pmcj.2024.101993_bib0035
  article-title: Guard against trust management vulnerabilities in wireless sensor network
  publication-title: Arab. J. Sci. Eng.
  doi: 10.1007/s13369-017-3052-7
– volume: 15
  start-page: 7040
  issue: 3
  year: 2015
  ident: 10.1016/j.pmcj.2024.101993_bib0033
  article-title: A robust trust establishment scheme for wireless sensor networks
  publication-title: Sensors
  doi: 10.3390/s150307040
– volume: 137
  start-page: 671
  issue: 2
  year: 2024
  ident: 10.1016/j.pmcj.2024.101993_bib0021
  article-title: Customizable fuzzy-neuro inference system attack detection based on trust for mobile wireless sensor networks
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-024-11263-4
– volume: 96
  start-page: 605
  year: 2019
  ident: 10.1016/j.pmcj.2024.101993_bib0019
  article-title: BTEM: belief based trust evaluation mechanism for wireless sensor networks
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.02.004
– volume: 2021
  start-page: 10
  year: 2021
  ident: 10.1016/j.pmcj.2024.101993_bib0006
  article-title: Dynamic network security mechanism based on trust management in wireless sensor networks
  publication-title: Wirel. Commun. Mob. Com.
– volume: 72
  start-page: 1
  issue: 5
  year: 2021
  ident: 10.1016/j.pmcj.2024.101993_bib0018
  article-title: A blockchain-based trust management method for internet of things
  publication-title: Pervasive Mob. Comput.
– volume: 11
  start-page: 5385
  issue: 15
  year: 2015
  ident: 10.1016/j.pmcj.2024.101993_bib0039
  article-title: A trust evaluation model based on bad behaviors for wireless sensor networks
  publication-title: J. Comput. Inf. Syst.
– volume: 2022
  start-page: 9
  year: 2022
  ident: 10.1016/j.pmcj.2024.101993_bib0005
  article-title: Review on security issues and applications of trust mechanism in wireless sensor networks
  publication-title: Comput. Intell. Neurosci.
  doi: 10.1155/2022/3449428
– volume: 125
  start-page: 63
  issue: 1
  year: 2022
  ident: 10.1016/j.pmcj.2024.101993_bib0013
  article-title: FEBSRA: fuzzy trust based energy aware balanced secure routing algorithm for secured communications in WSNs
  publication-title: Wirel. Pers. A commu. Int. J.
  doi: 10.1007/s11277-022-09541-0
– volume: 9
  start-page: 22230
  issue: 22
  year: 2022
  ident: 10.1016/j.pmcj.2024.101993_bib0017
  article-title: Securing software-defined wsns communication via trust management
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2021.3102578
– volume: 22
  start-page: 7361
  issue: 7
  year: 2022
  ident: 10.1016/j.pmcj.2024.101993_bib0020
  article-title: A wormhole attack detection algorithm integrated with the node trust optimization model in WSNs
  publication-title: IEEE Sens. J.
  doi: 10.1109/JSEN.2022.3152841
– volume: 26
  start-page: 3553
  issue: 5
  year: 2020
  ident: 10.1016/j.pmcj.2024.101993_bib0023
  article-title: Joint trust: an approach for trust-aware routing in WSN
  publication-title: Wirel. Netw.
  doi: 10.1007/s11276-020-02271-w
– volume: 37
  start-page: e5664
  issue: 3
  year: 2024
  ident: 10.1016/j.pmcj.2024.101993_bib0004
  article-title: Multi-objective cluster head-based energy aware routing using optimized auto-metric graph neural network for secured data aggregation in Wireless Sensor Network
  publication-title: Int. J. Commun. Syst.
  doi: 10.1002/dac.5664
– volume: 25
  start-page: 3805
  issue: 7
  year: 2019
  ident: 10.1016/j.pmcj.2024.101993_bib0012
  article-title: A secure routing protocol with regional partitioned clustering and Beta trust management in smart home
  publication-title: Wirel. Netw.
  doi: 10.1007/s11276-018-01916-1
– volume: 20
  start-page: 165
  issue: 1
  year: 2020
  ident: 10.1016/j.pmcj.2024.101993_bib0029
  article-title: Information-aware secure routing in wireless sensor networks
  publication-title: Sensors
  doi: 10.3390/s20010165
– volume: 32
  start-page: e4248
  issue: 6
  year: 2021
  ident: 10.1016/j.pmcj.2024.101993_bib0030
  article-title: DEIT: dempster Shafer Theory-based edge-centric internet of things-specific trust model
  publication-title: Trans. Emerg. Telecommun. Technol.
  doi: 10.1002/ett.4248
SSID ssj0041470
Score 2.389592
Snippet Many trust-based models for wireless sensor networks do not account for trust attacks, which are destructive phenomena that undermine the security and...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 101993
SubjectTerms Density peaks clustering algorithm
Security model
Trust attacks
Wireless sensor networks
Title Trust-aware and improved density peaks clustering algorithm for fast and secure models in wireless sensor networks
URI https://dx.doi.org/10.1016/j.pmcj.2024.101993
Volume 105
WOSCitedRecordID wos001339225100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  issn: 1574-1192
  databaseCode: AIEXJ
  dateStart: 20050301
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: false
  ssIdentifier: ssj0041470
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWLQc4IJ5qeckHblVWSezE9rFCRQWhqociLacosR2aJZtdbZLSP8F_Zmzn1QIVPZCDFVn2bJT5djw7-80MQu8kkSzlufKkimKPxjzzUqKEp-KcE_BQuFDcNptgp6d8uRRns9nPPhfmsmRVxa-uxPa_qhrmQNkmdfYO6h6EwgTcg9JhBLXD-G-KN1kUXvoj7f8ZsGED8CuV4aqDz73V6ff6UJatqZFgcxTLb5td0VysLecwT2vHOq9NKF67XjmWNWvKGpfGMtYgCVZWjkJeTx3cMxPktZR4I2K9ycDqWN562_SHpLV31tiBqVkV47nQha5P2iIrRqaQpRt8bfWFHvcPYe7PRVlMAxchnZBAOlvLYC4Q142xH03MKdgL4Roo_mbpXdBhtdiu5WphxC_GxdfLat847gYSYs9vWyVGRmJkJE7GPbQXskjwOdo7-ni8_NQf7TSgtvvg8ORdFpYjDN58kj97OhPv5fwxetT97MBHDi5P0ExXT9HDSTHKZ2g3AQ4G5eEeOLgDDrbAwSNw8AAcDMDBBjh2owMOdsDBRYV74GAHHNwD5zn68uH4_P2J13Xk8CTx_cZjhOcsyv2Mwhef0zDMMp1GcFGVB0orQnPJCaG-BDcnZiIPQqW1CLXITdJzQF6gebWp9D7CVCpYwPyQCXDiU19QFkvz4uI8JToODlDQv71EduXqTdeUMvm73g7Q4bBn64q13Lo66pWSdO6mcyMTwNgt-17e6VNeoQcj-F-jebNr9Rt0X142Rb172wHsF8ptpU8
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Trust-aware+and+improved+density+peaks+clustering+algorithm+for+fast+and+secure+models+in+wireless+sensor+networks&rft.jtitle=Pervasive+and+mobile+computing&rft.au=Han%2C+Youjia&rft.au=Wang%2C+Huibin&rft.au=Li%2C+Yueheng&rft.au=Zhang%2C+Lili&rft.date=2024-12-01&rft.issn=1574-1192&rft.volume=105&rft.spage=101993&rft_id=info:doi/10.1016%2Fj.pmcj.2024.101993&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_pmcj_2024_101993
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1574-1192&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1574-1192&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1574-1192&client=summon