Trust-aware and improved density peaks clustering algorithm for fast and secure models in wireless sensor networks
Many trust-based models for wireless sensor networks do not account for trust attacks, which are destructive phenomena that undermine the security and reliability of these models. Therefore, a trust-based fast security model fused with an improved density peaks clustering algorithm (TFSM-DPC) is pro...
Saved in:
| Published in: | Pervasive and mobile computing Vol. 105; p. 101993 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Elsevier B.V
01.12.2024
|
| Subjects: | |
| ISSN: | 1574-1192 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Many trust-based models for wireless sensor networks do not account for trust attacks, which are destructive phenomena that undermine the security and reliability of these models. Therefore, a trust-based fast security model fused with an improved density peaks clustering algorithm (TFSM-DPC) is proposed to quickly identify trust attacks in this paper. First, when calculating direct trust values, TFSM-DPC designs the adaptive penalty factors based on the state of received and sent packets and behaviors, and introduces the volatilization factors to reduce the effect of historical trust values. Second, TFSM-DPC improved density peaks clustering (DPC) algorithm to evaluate the trustworthiness of each recommendation value, thus filtering malicious recommendations before calculating the indirect trust values. Moreover, to filter two types of recommendations, the improved DPC algorithm incorporates artificial benchmark data along with trust values recommended by neighbors as input data. Finally, based on the relationship between direct trust and indirect trust, a secure formula for calculate the comprehensive trust is designed. Therefore, the proposed TFSM-DPC can improve the accuracy of trust evaluation and speed up the identification of malicious nodes. Simulation results show that TFSM-DPC can effectively identify on-off, bad-mouth and collusion attacks, and improve the speed of excluding malicious nodes from the network, compared to other trust-based algorithms. |
|---|---|
| AbstractList | Many trust-based models for wireless sensor networks do not account for trust attacks, which are destructive phenomena that undermine the security and reliability of these models. Therefore, a trust-based fast security model fused with an improved density peaks clustering algorithm (TFSM-DPC) is proposed to quickly identify trust attacks in this paper. First, when calculating direct trust values, TFSM-DPC designs the adaptive penalty factors based on the state of received and sent packets and behaviors, and introduces the volatilization factors to reduce the effect of historical trust values. Second, TFSM-DPC improved density peaks clustering (DPC) algorithm to evaluate the trustworthiness of each recommendation value, thus filtering malicious recommendations before calculating the indirect trust values. Moreover, to filter two types of recommendations, the improved DPC algorithm incorporates artificial benchmark data along with trust values recommended by neighbors as input data. Finally, based on the relationship between direct trust and indirect trust, a secure formula for calculate the comprehensive trust is designed. Therefore, the proposed TFSM-DPC can improve the accuracy of trust evaluation and speed up the identification of malicious nodes. Simulation results show that TFSM-DPC can effectively identify on-off, bad-mouth and collusion attacks, and improve the speed of excluding malicious nodes from the network, compared to other trust-based algorithms. |
| ArticleNumber | 101993 |
| Author | Li, Yueheng Zhang, Lili Wang, Huibin Han, Youjia |
| Author_xml | – sequence: 1 givenname: Youjia orcidid: 0000-0003-2154-3234 surname: Han fullname: Han, Youjia – sequence: 2 givenname: Huibin surname: Wang fullname: Wang, Huibin email: hbwang@hhu.edu.cn – sequence: 3 givenname: Yueheng surname: Li fullname: Li, Yueheng – sequence: 4 givenname: Lili surname: Zhang fullname: Zhang, Lili |
| BookMark | eNp9kL9uwjAQhz1QqUD7Ap38AqG245BE6lKh_pOQutDZMvaZOiR2ZBsQb9-kdOrALSfd_b6T7puhifMOEHqgZEEJXT42i75TzYIRxsdBXecTNKVFyTNKa3aLZjE2hHDKSzJFYRMOMWXyJANg6TS2XR_8ETTW4KJNZ9yD3Ees2iEGwbodlu3OB5u-O2x8wEbG9AtGUIfhRuc1tBFbh082QAsxDhsXh6SDdPJhH-_QjZFthPu_Pkdfry-b1Xu2_nz7WD2vM5UTkrIyr0xZGLLlSsmKM7bdgiyG4tpQDTrnRlV5zonirF6WtaFMA9QMakOKsqb5HLHLXRV8jAGM6IPtZDgLSsRoSjRiNCVGU-JiaoCqf5CySSbrXQrSttfRpws6_A9HC0FEZcEp0IMIlYT29hr-A4AMi4g |
| CitedBy_id | crossref_primary_10_1109_JSEN_2025_3570812 crossref_primary_10_3390_s25072056 crossref_primary_10_3390_app15063075 |
| Cites_doi | 10.1109/TII.2019.2961340 10.1109/JIOT.2021.3081422 10.1016/j.comcom.2023.08.011 10.1109/ACCESS.2019.2904544 10.1007/s11276-022-02991-1 10.1016/j.adhoc.2020.102215 10.1007/s11277-024-11504-6 10.1007/s11227-021-04092-w 10.1016/j.comnet.2021.108250 10.1007/s11276-024-03687-4 10.1109/ACCESS.2017.2786944 10.1007/s12652-020-02638-z 10.1109/ACCESS.2019.2916340 10.1007/s11276-019-02129-w 10.1109/ACCESS.2017.2706973 10.3390/s19061467 10.1109/JSEN.2017.2699561 10.1007/s11042-019-7585-5 10.3390/app12042045 10.3390/s22020411 10.1007/s13369-017-3052-7 10.3390/s150307040 10.1007/s11277-024-11263-4 10.1016/j.future.2019.02.004 10.1155/2022/3449428 10.1007/s11277-022-09541-0 10.1109/JIOT.2021.3102578 10.1109/JSEN.2022.3152841 10.1007/s11276-020-02271-w 10.1002/dac.5664 10.1007/s11276-018-01916-1 10.3390/s20010165 10.1002/ett.4248 |
| ContentType | Journal Article |
| Copyright | 2024 |
| Copyright_xml | – notice: 2024 |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.pmcj.2024.101993 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| ExternalDocumentID | 10_1016_j_pmcj_2024_101993 S1574119224001184 |
| GroupedDBID | --K --M .~1 0R~ 123 1B1 1~. 1~5 4.4 457 4G. 5VS 7-5 71M 8P~ AACTN AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAXKI AAXUO AAYFN ABBOA ABFRF ABJNI ABMAC ABXDB ACDAQ ACGFO ACGFS ACNNM ACRLP ACRPL ACZNC ADBBV ADEZE ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFJKZ AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJOXV AKRWK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W JJJVA KOM M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 RIG ROL RPZ SCC SDF SDG SES SPC SPCBC SST SSV SSZ T5K UNMZH ~G- 9DU AATTM AAYWO AAYXX ABWVN ACLOT ACVFH ADCNI ADNMO AEIPS AEUPX AFPUW AIGII AIIUN AKBMS AKYEP ANKPU APXCP CITATION EFKBS EFLBG ~HD |
| ID | FETCH-LOGICAL-c300t-738f75f0b4cca8422bbea55554df1ded34fc83340c429679f12dee92e9f057913 |
| ISICitedReferencesCount | 3 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001339225100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1574-1192 |
| IngestDate | Sat Nov 29 01:32:45 EST 2025 Tue Nov 18 21:50:03 EST 2025 Wed Dec 04 16:46:46 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Security model Density peaks clustering algorithm Wireless sensor networks Trust attacks |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c300t-738f75f0b4cca8422bbea55554df1ded34fc83340c429679f12dee92e9f057913 |
| ORCID | 0000-0003-2154-3234 |
| ParticipantIDs | crossref_primary_10_1016_j_pmcj_2024_101993 crossref_citationtrail_10_1016_j_pmcj_2024_101993 elsevier_sciencedirect_doi_10_1016_j_pmcj_2024_101993 |
| PublicationCentury | 2000 |
| PublicationDate | December 2024 2024-12-00 |
| PublicationDateYYYYMMDD | 2024-12-01 |
| PublicationDate_xml | – month: 12 year: 2024 text: December 2024 |
| PublicationDecade | 2020 |
| PublicationTitle | Pervasive and mobile computing |
| PublicationYear | 2024 |
| Publisher | Elsevier B.V |
| Publisher_xml | – sequence: 0 name: Elsevier B.V |
| References | SureshKumar, Vimala (bib0032) 2021; 197 Fang, Zhang, Chen (bib0031) Jan. 2021; 14 Fang, Zhang, Chen (bib0036) Jul. 2020; 26 Sahoo, Ray, Sarkar (bib0035) Dec. 2018; 43 Reddy, Negi, Venkataraman (bib0038) Jun. 2017; 17 Zhou, Shao, Sun (bib0039) 2015; 11 Saidi, Benahmed, Seddiki (bib0011) Sep. 2020; 106 Janarthanan, Srinivasan (bib0004) Oct. 2024; 37 Ramathilagam, Vijayalakshmi (bib0021) Jul. 2024; 137 Bhargava, Verma (bib0030) Jun. 2021; 32 Fang, Zhang, Chen (bib0014) Sep. 2020; 2020 Ramesh, Yaashuwanth (bib0028) Apr. 2020; 79 Saidi (bib0037) May. 2024; 30 Althubiti (bib0008) Apr. 2022; 2022 Wu, Liang (bib0018) Apr. 2021; 72 Din, Bano, Awan (bib0022) Feb. 2021; 10 Anwar, Zainal, Outay (bib0019) Jul. 2019; 96 Yu, Li, Li (bib0027) Mar. 2022; 13 Manoharan, Subramani, Ramu (bib0001) May. 2024; 43 Kumar, Tripathi, Agrawal (bib0010) 2022; 28 Awan, Din, Almogren (bib0016) Jun. 2019; 7 Alrahhal, Jamous, Ramadan (bib0015) Feb. 2022; 12 Zhao, Huang, Xiong (bib0034) Apr. 2019; 7 Refaee, Shamsudheen (bib0026) Mar. 2022; 78 Awan, Javaid, Ullah (bib0003) Jan. 2022; 22 Xia, Wei, Zhang (bib0005) Sep. 2022; 2022 Sun, Li (bib0040) Mar. 2018; 6 Bin-Yahya (bib0017) Nov. 2022; 9 Teng (bib0020) Apr. 2022; 22 Zheng, Gong, Zhang (bib0006) Feb. 2021; 2021 Feroz Khan (bib0025) Jul. 2024; 137 Alnumay, Ghosh, Chatterjee (bib0024) Mar. 2019; 19 Hong, Shao, Liao (bib0012) Oct. 2019; 25 Anitha, Bapu, Kuppusamy (bib0013) Jul. 2022; 125 Qin, Yang, Jia (bib0041) Jul. 2017; 5 Altuwairiqi (bib0002) Jan. 2024; 214 Cao, Zhao, Gu (bib0009) 2020; 16 Rodrigues, John (bib0023) Jul. 2020; 26 Ishmanov, Kim, Nam (bib0033) Mar. 2015; 15 Yuan (bib0007) May. 2022; 2022 Shi, Qin, Ding, Xie, Zheng, Song (bib0029) Jan. 2020; 20 Zhou (10.1016/j.pmcj.2024.101993_bib0039) 2015; 11 Xia (10.1016/j.pmcj.2024.101993_bib0005) 2022; 2022 Ishmanov (10.1016/j.pmcj.2024.101993_bib0033) 2015; 15 Reddy (10.1016/j.pmcj.2024.101993_bib0038) 2017; 17 Awan (10.1016/j.pmcj.2024.101993_bib0003) 2022; 22 Wu (10.1016/j.pmcj.2024.101993_bib0018) 2021; 72 Yuan (10.1016/j.pmcj.2024.101993_bib0007) 2022; 2022 Alnumay (10.1016/j.pmcj.2024.101993_bib0024) 2019; 19 Saidi (10.1016/j.pmcj.2024.101993_bib0037) 2024; 30 Teng (10.1016/j.pmcj.2024.101993_bib0020) 2022; 22 Zhao (10.1016/j.pmcj.2024.101993_bib0034) 2019; 7 Zheng (10.1016/j.pmcj.2024.101993_bib0006) 2021; 2021 SureshKumar (10.1016/j.pmcj.2024.101993_bib0032) 2021; 197 Qin (10.1016/j.pmcj.2024.101993_bib0041) 2017; 5 Rodrigues (10.1016/j.pmcj.2024.101993_bib0023) 2020; 26 Yu (10.1016/j.pmcj.2024.101993_bib0027) 2022; 13 Ramathilagam (10.1016/j.pmcj.2024.101993_bib0021) 2024; 137 Anitha (10.1016/j.pmcj.2024.101993_bib0013) 2022; 125 Fang (10.1016/j.pmcj.2024.101993_bib0014) 2020; 2020 Din (10.1016/j.pmcj.2024.101993_bib0022) 2021; 10 Fang (10.1016/j.pmcj.2024.101993_bib0036) 2020; 26 Cao (10.1016/j.pmcj.2024.101993_bib0009) 2020; 16 Bin-Yahya (10.1016/j.pmcj.2024.101993_bib0017) 2022; 9 Altuwairiqi (10.1016/j.pmcj.2024.101993_bib0002) 2024; 214 Manoharan (10.1016/j.pmcj.2024.101993_bib0001) 2024; 43 Janarthanan (10.1016/j.pmcj.2024.101993_bib0004) 2024; 37 Ramesh (10.1016/j.pmcj.2024.101993_bib0028) 2020; 79 Refaee (10.1016/j.pmcj.2024.101993_bib0026) 2022; 78 Althubiti (10.1016/j.pmcj.2024.101993_bib0008) 2022; 2022 Alrahhal (10.1016/j.pmcj.2024.101993_bib0015) 2022; 12 Kumar (10.1016/j.pmcj.2024.101993_bib0010) 2022; 28 Feroz Khan (10.1016/j.pmcj.2024.101993_bib0025) 2024; 137 Fang (10.1016/j.pmcj.2024.101993_bib0031) 2021; 14 Sun (10.1016/j.pmcj.2024.101993_bib0040) 2018; 6 Shi (10.1016/j.pmcj.2024.101993_bib0029) 2020; 20 Saidi (10.1016/j.pmcj.2024.101993_bib0011) 2020; 106 Bhargava (10.1016/j.pmcj.2024.101993_bib0030) 2021; 32 Sahoo (10.1016/j.pmcj.2024.101993_bib0035) 2018; 43 Hong (10.1016/j.pmcj.2024.101993_bib0012) 2019; 25 Awan (10.1016/j.pmcj.2024.101993_bib0016) 2019; 7 Anwar (10.1016/j.pmcj.2024.101993_bib0019) 2019; 96 |
| References_xml | – volume: 37 start-page: e5664 year: Oct. 2024 ident: bib0004 article-title: Multi-objective cluster head-based energy aware routing using optimized auto-metric graph neural network for secured data aggregation in Wireless Sensor Network publication-title: Int. J. Commun. Syst. – volume: 125 start-page: 63 year: Jul. 2022 end-page: 86 ident: bib0013 article-title: FEBSRA: fuzzy trust based energy aware balanced secure routing algorithm for secured communications in WSNs publication-title: Wirel. Pers. A commu. Int. J. – volume: 10 start-page: 2776 year: Feb. 2021 end-page: 2783 ident: bib0022 article-title: LightTrust: lightweight trust management for edge devices in industrial internet of things publication-title: IEEE Internet Things J. – volume: 106 start-page: 102215.1 year: Sep. 2020 end-page: 102215.24 ident: bib0011 article-title: Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks publication-title: Ad Hoc Netw. – volume: 2022 start-page: 9 year: Sep. 2022 ident: bib0005 article-title: Review on security issues and applications of trust mechanism in wireless sensor networks publication-title: Comput. Intell. Neurosci. – volume: 26 start-page: 3553 year: Jul. 2020 end-page: 3568 ident: bib0023 article-title: Joint trust: an approach for trust-aware routing in WSN publication-title: Wirel. Netw. – volume: 6 start-page: 4725 year: Mar. 2018 end-page: 4741 ident: bib0040 article-title: A Comprehensive trust-aware routing protocol with multi-attributes for WSNs publication-title: IEEE Access – volume: 7 start-page: 33859 year: Apr. 2019 end-page: 33869 ident: bib0034 article-title: An effective exponential-based trust and reputation evaluation system in wireless sensor networks publication-title: IEEE Access. – volume: 2021 start-page: 10 year: Feb. 2021 ident: bib0006 article-title: Dynamic network security mechanism based on trust management in wireless sensor networks publication-title: Wirel. Commun. Mob. Com. – volume: 14 year: Jan. 2021 ident: bib0031 article-title: MSCR: multidimensional secure clustered routing scheme in hierarchical wireless sensor networks publication-title: EURASIP J. Wirel. Commun. Netw. – volume: 30 start-page: 2589 year: May. 2024 end-page: 2615 ident: bib0037 article-title: An adaptive trust system for misbehavior detection in wireless sensor networks publication-title: Wirel. Netw. – volume: 12 start-page: 2045 year: Feb. 2022 ident: bib0015 article-title: Utilising acknowledge for the trust in wireless sensor networks publication-title: Appl. Sci. – volume: 17 start-page: 3921 year: Jun. 2017 end-page: 3929 ident: bib0038 article-title: communication and data trust for wireless sensor networks using D–S theory publication-title: IEEE Sens. J. – volume: 96 start-page: 605 year: Jul. 2019 end-page: 616 ident: bib0019 article-title: BTEM: belief based trust evaluation mechanism for wireless sensor networks publication-title: Future Gener. Comput. Syst. – volume: 22 start-page: 411 year: Jan. 2022 ident: bib0003 article-title: Blockchain based secure routing and trust management in wireless sensor networks publication-title: Sensors – volume: 22 start-page: 7361 year: Apr. 2022 end-page: 7370 ident: bib0020 article-title: A wormhole attack detection algorithm integrated with the node trust optimization model in WSNs publication-title: IEEE Sens. J. – volume: 15 start-page: 7040 year: Mar. 2015 end-page: 7061 ident: bib0033 article-title: A robust trust establishment scheme for wireless sensor networks publication-title: Sensors – volume: 28 start-page: 2913 year: 2022 end-page: 2936 ident: bib0010 article-title: Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks publication-title: Wirel. Netw. – volume: 197 year: 2021 ident: bib0032 article-title: Energy efficient routing protocol using exponentially-ant lion whale optimization algorithm in wireless sensor networks publication-title: Comput. Netw. – volume: 2022 year: Apr. 2022 ident: bib0008 article-title: A trust aware authentication scheme for wireless sensor networks optimized by salp swarm optimization and deep belief networks publication-title: Math. Probl. Eng. – volume: 5 start-page: 9599 year: Jul. 2017 end-page: 9609 ident: bib0041 article-title: Research on trust sensing based secure routing mechanism for wireless sensor network publication-title: IEEE Access – volume: 43 year: May. 2024 ident: bib0001 article-title: An optimal energy efficient routing in WSN using adaptive entropy bald eagle search optimization and density based adaptive soft clustering publication-title: Sustain. Comput. Inform. Syst. – volume: 214 start-page: 244 year: Jan. 2024 end-page: 259 ident: bib0002 article-title: An optimized multi-hop routing protocol for wireless sensor network using improved honey badger optimization algorithm for efficient and secure QoS publication-title: Comput. Commun. – volume: 32 start-page: e4248 year: Jun. 2021 ident: bib0030 article-title: DEIT: dempster Shafer Theory-based edge-centric internet of things-specific trust model publication-title: Trans. Emerg. Telecommun. Technol. – volume: 26 start-page: 3169 year: Jul. 2020 end-page: 3182 ident: bib0036 article-title: TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing publication-title: Wirel. Netw. – volume: 137 start-page: 671 year: Jul. 2024 end-page: 684 ident: bib0021 article-title: Customizable fuzzy-neuro inference system attack detection based on trust for mobile wireless sensor networks publication-title: Wirel. Pers. Commun. – volume: 7 start-page: 62095 year: Jun. 2019 end-page: 62106 ident: bib0016 article-title: Robusttrust–a pro-privacy robust distributed trust management mechanism for internet of things publication-title: IEEE Access. – volume: 2020 start-page: 20 year: Sep. 2020 ident: bib0014 article-title: Trust-based attack and defense in wireless sensor networks: a survey publication-title: Wirel. Commu. Mob. Com. – volume: 13 start-page: 1405 year: Mar. 2022 end-page: 1417 ident: bib0027 article-title: Trust-based secure directed diffusion routing protocol in WSN publication-title: J. Ambient Intell. Humaniz. Comput. – volume: 2022 start-page: 9 year: May. 2022 ident: bib0007 article-title: A Secure routing protocol for wireless sensor energy network based on trust management publication-title: Wirel. Commun. Mob. Com. – volume: 20 start-page: 165 year: Jan. 2020 ident: bib0029 article-title: Information-aware secure routing in wireless sensor networks publication-title: Sensors – volume: 19 start-page: 1467 year: Mar. 2019 ident: bib0024 article-title: A trust-based predictive model for mobile ad hoc network in internet of things publication-title: Sensors – volume: 16 start-page: 5309 year: 2020 end-page: 5316 ident: bib0009 article-title: Security-aware industrial wireless sensor network deployment optimization publication-title: IEEE Trans. Industr. Inform. – volume: 78 start-page: 5610 year: Mar. 2022 end-page: 5625 ident: bib0026 article-title: Trust- and energy-aware cluster head selection in a UAV-based wireless sensor network using Fit-FCM publication-title: J. Supercomput. – volume: 11 start-page: 5385 year: 2015 end-page: 5392 ident: bib0039 article-title: A trust evaluation model based on bad behaviors for wireless sensor networks publication-title: J. Comput. Inf. Syst. – volume: 9 start-page: 22230 year: Nov. 2022 end-page: 22245 ident: bib0017 article-title: Securing software-defined wsns communication via trust management publication-title: IEEE Internet Things J. – volume: 43 start-page: 7229 year: Dec. 2018 end-page: 7251 ident: bib0035 article-title: Guard against trust management vulnerabilities in wireless sensor network publication-title: Arab. J. Sci. Eng. – volume: 72 start-page: 1 year: Apr. 2021 end-page: 16 ident: bib0018 article-title: A blockchain-based trust management method for internet of things publication-title: Pervasive Mob. Comput. – volume: 137 start-page: 2397 year: Jul. 2024 end-page: 2407 ident: bib0025 article-title: An Enhanced multi attribute based trusted attack resistance (embtr) for the secure routing of sensor nodes in wireless sensor network publication-title: Wirel. Pers. Commun. – volume: 79 start-page: 10157 year: Apr. 2020 end-page: 10176 ident: bib0028 article-title: Enhanced approach using trust based decision making for secured wireless streaming video sensor networks publication-title: Multimed. Tools Appl. – volume: 25 start-page: 3805 year: Oct. 2019 end-page: 3823 ident: bib0012 article-title: A secure routing protocol with regional partitioned clustering and Beta trust management in smart home publication-title: Wirel. Netw. – volume: 2022 start-page: 9 year: 2022 ident: 10.1016/j.pmcj.2024.101993_bib0007 article-title: A Secure routing protocol for wireless sensor energy network based on trust management publication-title: Wirel. Commun. Mob. Com. – volume: 16 start-page: 5309 issue: 8 year: 2020 ident: 10.1016/j.pmcj.2024.101993_bib0009 article-title: Security-aware industrial wireless sensor network deployment optimization publication-title: IEEE Trans. Industr. Inform. doi: 10.1109/TII.2019.2961340 – volume: 2022 issue: 1 year: 2022 ident: 10.1016/j.pmcj.2024.101993_bib0008 article-title: A trust aware authentication scheme for wireless sensor networks optimized by salp swarm optimization and deep belief networks publication-title: Math. Probl. Eng. – volume: 10 start-page: 2776 issue: 4 year: 2021 ident: 10.1016/j.pmcj.2024.101993_bib0022 article-title: LightTrust: lightweight trust management for edge devices in industrial internet of things publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2021.3081422 – volume: 214 start-page: 244 year: 2024 ident: 10.1016/j.pmcj.2024.101993_bib0002 article-title: An optimized multi-hop routing protocol for wireless sensor network using improved honey badger optimization algorithm for efficient and secure QoS publication-title: Comput. Commun. doi: 10.1016/j.comcom.2023.08.011 – volume: 7 start-page: 33859 year: 2019 ident: 10.1016/j.pmcj.2024.101993_bib0034 article-title: An effective exponential-based trust and reputation evaluation system in wireless sensor networks publication-title: IEEE Access. doi: 10.1109/ACCESS.2019.2904544 – volume: 28 start-page: 2913 issue: 8 year: 2022 ident: 10.1016/j.pmcj.2024.101993_bib0010 article-title: Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks publication-title: Wirel. Netw. doi: 10.1007/s11276-022-02991-1 – volume: 106 start-page: 102215.1 year: 2020 ident: 10.1016/j.pmcj.2024.101993_bib0011 article-title: Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks publication-title: Ad Hoc Netw. doi: 10.1016/j.adhoc.2020.102215 – volume: 137 start-page: 2397 issue: 4 year: 2024 ident: 10.1016/j.pmcj.2024.101993_bib0025 article-title: An Enhanced multi attribute based trusted attack resistance (embtr) for the secure routing of sensor nodes in wireless sensor network publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-024-11504-6 – volume: 78 start-page: 5610 issue: 4 year: 2022 ident: 10.1016/j.pmcj.2024.101993_bib0026 article-title: Trust- and energy-aware cluster head selection in a UAV-based wireless sensor network using Fit-FCM publication-title: J. Supercomput. doi: 10.1007/s11227-021-04092-w – volume: 197 year: 2021 ident: 10.1016/j.pmcj.2024.101993_bib0032 article-title: Energy efficient routing protocol using exponentially-ant lion whale optimization algorithm in wireless sensor networks publication-title: Comput. Netw. doi: 10.1016/j.comnet.2021.108250 – volume: 30 start-page: 2589 issue: 4 year: 2024 ident: 10.1016/j.pmcj.2024.101993_bib0037 article-title: An adaptive trust system for misbehavior detection in wireless sensor networks publication-title: Wirel. Netw. doi: 10.1007/s11276-024-03687-4 – volume: 6 start-page: 4725 year: 2018 ident: 10.1016/j.pmcj.2024.101993_bib0040 article-title: A Comprehensive trust-aware routing protocol with multi-attributes for WSNs publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2786944 – volume: 43 year: 2024 ident: 10.1016/j.pmcj.2024.101993_bib0001 article-title: An optimal energy efficient routing in WSN using adaptive entropy bald eagle search optimization and density based adaptive soft clustering publication-title: Sustain. Comput. Inform. Syst. – volume: 13 start-page: 1405 issue: 3 year: 2022 ident: 10.1016/j.pmcj.2024.101993_bib0027 article-title: Trust-based secure directed diffusion routing protocol in WSN publication-title: J. Ambient Intell. Humaniz. Comput. doi: 10.1007/s12652-020-02638-z – volume: 7 start-page: 62095 year: 2019 ident: 10.1016/j.pmcj.2024.101993_bib0016 article-title: Robusttrust–a pro-privacy robust distributed trust management mechanism for internet of things publication-title: IEEE Access. doi: 10.1109/ACCESS.2019.2916340 – volume: 26 start-page: 3169 issue: 11 year: 2020 ident: 10.1016/j.pmcj.2024.101993_bib0036 article-title: TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing publication-title: Wirel. Netw. doi: 10.1007/s11276-019-02129-w – volume: 5 start-page: 9599 issue: 99 year: 2017 ident: 10.1016/j.pmcj.2024.101993_bib0041 article-title: Research on trust sensing based secure routing mechanism for wireless sensor network publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2706973 – volume: 19 start-page: 1467 issue: 6 year: 2019 ident: 10.1016/j.pmcj.2024.101993_bib0024 article-title: A trust-based predictive model for mobile ad hoc network in internet of things publication-title: Sensors doi: 10.3390/s19061467 – volume: 17 start-page: 3921 issue: 12 year: 2017 ident: 10.1016/j.pmcj.2024.101993_bib0038 article-title: communication and data trust for wireless sensor networks using D–S theory publication-title: IEEE Sens. J. doi: 10.1109/JSEN.2017.2699561 – volume: 79 start-page: 10157 issue: 15 year: 2020 ident: 10.1016/j.pmcj.2024.101993_bib0028 article-title: Enhanced approach using trust based decision making for secured wireless streaming video sensor networks publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-019-7585-5 – volume: 12 start-page: 2045 issue: 4 year: 2022 ident: 10.1016/j.pmcj.2024.101993_bib0015 article-title: Utilising acknowledge for the trust in wireless sensor networks publication-title: Appl. Sci. doi: 10.3390/app12042045 – volume: 14 issue: 10 year: 2021 ident: 10.1016/j.pmcj.2024.101993_bib0031 article-title: MSCR: multidimensional secure clustered routing scheme in hierarchical wireless sensor networks publication-title: EURASIP J. Wirel. Commun. Netw. – volume: 2020 start-page: 20 year: 2020 ident: 10.1016/j.pmcj.2024.101993_bib0014 article-title: Trust-based attack and defense in wireless sensor networks: a survey publication-title: Wirel. Commu. Mob. Com. – volume: 22 start-page: 411 issue: 2 year: 2022 ident: 10.1016/j.pmcj.2024.101993_bib0003 article-title: Blockchain based secure routing and trust management in wireless sensor networks publication-title: Sensors doi: 10.3390/s22020411 – volume: 43 start-page: 7229 issue: 12 year: 2018 ident: 10.1016/j.pmcj.2024.101993_bib0035 article-title: Guard against trust management vulnerabilities in wireless sensor network publication-title: Arab. J. Sci. Eng. doi: 10.1007/s13369-017-3052-7 – volume: 15 start-page: 7040 issue: 3 year: 2015 ident: 10.1016/j.pmcj.2024.101993_bib0033 article-title: A robust trust establishment scheme for wireless sensor networks publication-title: Sensors doi: 10.3390/s150307040 – volume: 137 start-page: 671 issue: 2 year: 2024 ident: 10.1016/j.pmcj.2024.101993_bib0021 article-title: Customizable fuzzy-neuro inference system attack detection based on trust for mobile wireless sensor networks publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-024-11263-4 – volume: 96 start-page: 605 year: 2019 ident: 10.1016/j.pmcj.2024.101993_bib0019 article-title: BTEM: belief based trust evaluation mechanism for wireless sensor networks publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.02.004 – volume: 2021 start-page: 10 year: 2021 ident: 10.1016/j.pmcj.2024.101993_bib0006 article-title: Dynamic network security mechanism based on trust management in wireless sensor networks publication-title: Wirel. Commun. Mob. Com. – volume: 72 start-page: 1 issue: 5 year: 2021 ident: 10.1016/j.pmcj.2024.101993_bib0018 article-title: A blockchain-based trust management method for internet of things publication-title: Pervasive Mob. Comput. – volume: 11 start-page: 5385 issue: 15 year: 2015 ident: 10.1016/j.pmcj.2024.101993_bib0039 article-title: A trust evaluation model based on bad behaviors for wireless sensor networks publication-title: J. Comput. Inf. Syst. – volume: 2022 start-page: 9 year: 2022 ident: 10.1016/j.pmcj.2024.101993_bib0005 article-title: Review on security issues and applications of trust mechanism in wireless sensor networks publication-title: Comput. Intell. Neurosci. doi: 10.1155/2022/3449428 – volume: 125 start-page: 63 issue: 1 year: 2022 ident: 10.1016/j.pmcj.2024.101993_bib0013 article-title: FEBSRA: fuzzy trust based energy aware balanced secure routing algorithm for secured communications in WSNs publication-title: Wirel. Pers. A commu. Int. J. doi: 10.1007/s11277-022-09541-0 – volume: 9 start-page: 22230 issue: 22 year: 2022 ident: 10.1016/j.pmcj.2024.101993_bib0017 article-title: Securing software-defined wsns communication via trust management publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2021.3102578 – volume: 22 start-page: 7361 issue: 7 year: 2022 ident: 10.1016/j.pmcj.2024.101993_bib0020 article-title: A wormhole attack detection algorithm integrated with the node trust optimization model in WSNs publication-title: IEEE Sens. J. doi: 10.1109/JSEN.2022.3152841 – volume: 26 start-page: 3553 issue: 5 year: 2020 ident: 10.1016/j.pmcj.2024.101993_bib0023 article-title: Joint trust: an approach for trust-aware routing in WSN publication-title: Wirel. Netw. doi: 10.1007/s11276-020-02271-w – volume: 37 start-page: e5664 issue: 3 year: 2024 ident: 10.1016/j.pmcj.2024.101993_bib0004 article-title: Multi-objective cluster head-based energy aware routing using optimized auto-metric graph neural network for secured data aggregation in Wireless Sensor Network publication-title: Int. J. Commun. Syst. doi: 10.1002/dac.5664 – volume: 25 start-page: 3805 issue: 7 year: 2019 ident: 10.1016/j.pmcj.2024.101993_bib0012 article-title: A secure routing protocol with regional partitioned clustering and Beta trust management in smart home publication-title: Wirel. Netw. doi: 10.1007/s11276-018-01916-1 – volume: 20 start-page: 165 issue: 1 year: 2020 ident: 10.1016/j.pmcj.2024.101993_bib0029 article-title: Information-aware secure routing in wireless sensor networks publication-title: Sensors doi: 10.3390/s20010165 – volume: 32 start-page: e4248 issue: 6 year: 2021 ident: 10.1016/j.pmcj.2024.101993_bib0030 article-title: DEIT: dempster Shafer Theory-based edge-centric internet of things-specific trust model publication-title: Trans. Emerg. Telecommun. Technol. doi: 10.1002/ett.4248 |
| SSID | ssj0041470 |
| Score | 2.389592 |
| Snippet | Many trust-based models for wireless sensor networks do not account for trust attacks, which are destructive phenomena that undermine the security and... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 101993 |
| SubjectTerms | Density peaks clustering algorithm Security model Trust attacks Wireless sensor networks |
| Title | Trust-aware and improved density peaks clustering algorithm for fast and secure models in wireless sensor networks |
| URI | https://dx.doi.org/10.1016/j.pmcj.2024.101993 |
| Volume | 105 |
| WOSCitedRecordID | wos001339225100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 1574-1192 databaseCode: AIEXJ dateStart: 20050301 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0041470 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWLQc4IJ5qeckHblVWSezE9rFCRQWhqociLacosR2aJZtdbZLSP8F_Zmzn1QIVPZCDFVn2bJT5djw7-80MQu8kkSzlufKkimKPxjzzUqKEp-KcE_BQuFDcNptgp6d8uRRns9nPPhfmsmRVxa-uxPa_qhrmQNkmdfYO6h6EwgTcg9JhBLXD-G-KN1kUXvoj7f8ZsGED8CuV4aqDz73V6ff6UJatqZFgcxTLb5td0VysLecwT2vHOq9NKF67XjmWNWvKGpfGMtYgCVZWjkJeTx3cMxPktZR4I2K9ycDqWN562_SHpLV31tiBqVkV47nQha5P2iIrRqaQpRt8bfWFHvcPYe7PRVlMAxchnZBAOlvLYC4Q142xH03MKdgL4Roo_mbpXdBhtdiu5WphxC_GxdfLat847gYSYs9vWyVGRmJkJE7GPbQXskjwOdo7-ni8_NQf7TSgtvvg8ORdFpYjDN58kj97OhPv5fwxetT97MBHDi5P0ExXT9HDSTHKZ2g3AQ4G5eEeOLgDDrbAwSNw8AAcDMDBBjh2owMOdsDBRYV74GAHHNwD5zn68uH4_P2J13Xk8CTx_cZjhOcsyv2Mwhef0zDMMp1GcFGVB0orQnPJCaG-BDcnZiIPQqW1CLXITdJzQF6gebWp9D7CVCpYwPyQCXDiU19QFkvz4uI8JToODlDQv71EduXqTdeUMvm73g7Q4bBn64q13Lo66pWSdO6mcyMTwNgt-17e6VNeoQcj-F-jebNr9Rt0X142Rb172wHsF8ptpU8 |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Trust-aware+and+improved+density+peaks+clustering+algorithm+for+fast+and+secure+models+in+wireless+sensor+networks&rft.jtitle=Pervasive+and+mobile+computing&rft.au=Han%2C+Youjia&rft.au=Wang%2C+Huibin&rft.au=Li%2C+Yueheng&rft.au=Zhang%2C+Lili&rft.date=2024-12-01&rft.issn=1574-1192&rft.volume=105&rft.spage=101993&rft_id=info:doi/10.1016%2Fj.pmcj.2024.101993&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_pmcj_2024_101993 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1574-1192&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1574-1192&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1574-1192&client=summon |