An Enhanced Multi Attribute Based Trusted Attack Resistance (EMBTR) for the Secure Routing of Sensor Nodes in Wireless Sensor Network
High-level security is crucial for protecting sensitive information transmitted across wireless sensor networks (WSNs). Secure routing plays a key role in preventing impersonation attacks within the network. Although numerous state-of-the-art routing models based on trusted metrics aim to enhance WS...
Uloženo v:
| Vydáno v: | Wireless personal communications Ročník 137; číslo 4; s. 2397 - 2407 |
|---|---|
| Hlavní autor: | |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New York
Springer US
01.08.2024
Springer Nature B.V |
| Témata: | |
| ISSN: | 0929-6212, 1572-834X |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | High-level security is crucial for protecting sensitive information transmitted across wireless sensor networks (WSNs). Secure routing plays a key role in preventing impersonation attacks within the network. Although numerous state-of-the-art routing models based on trusted metrics aim to enhance WSN security, challenges remain due to the network's dynamic nature. This paper introduces an enhanced multi-attribute-based trusted attack resistance (EMBTR) algorithm designed to securely manage routing using nodes' trust values. The proposed approach leverages Quality of Service (QoS) parameters such as stability rate (SR), reliability rate (RR), and elapsed time (ET) to improve network performance and combat trust-related attacks. By isolating misbehaving nodes based on their trust metrics, the algorithm establishes a reliable communication route. Comparisons with existing routing algorithms like TSRM (Trust-based Secure Routing Model) and TARF (Trust-aware Routing Framework for WSNs) demonstrate that the EMBTR algorithm effectively detects and eliminates malicious nodes, providing secure routing with higher detection rates and limited energy consumption compared to current solutions. |
|---|---|
| AbstractList | High-level security is crucial for protecting sensitive information transmitted across wireless sensor networks (WSNs). Secure routing plays a key role in preventing impersonation attacks within the network. Although numerous state-of-the-art routing models based on trusted metrics aim to enhance WSN security, challenges remain due to the network's dynamic nature. This paper introduces an enhanced multi-attribute-based trusted attack resistance (EMBTR) algorithm designed to securely manage routing using nodes' trust values. The proposed approach leverages Quality of Service (QoS) parameters such as stability rate (SR), reliability rate (RR), and elapsed time (ET) to improve network performance and combat trust-related attacks. By isolating misbehaving nodes based on their trust metrics, the algorithm establishes a reliable communication route. Comparisons with existing routing algorithms like TSRM (Trust-based Secure Routing Model) and TARF (Trust-aware Routing Framework for WSNs) demonstrate that the EMBTR algorithm effectively detects and eliminates malicious nodes, providing secure routing with higher detection rates and limited energy consumption compared to current solutions. |
| Author | Feroz Khan, A. B. |
| Author_xml | – sequence: 1 givenname: A. B. orcidid: 0000-0002-9395-9493 surname: Feroz Khan fullname: Feroz Khan, A. B. email: abferozkhan@gmail.com organization: Department of Computer Science, Syed Hameedha Arts and Science College |
| BookMark | eNp9kEtPWzEQhS1EJcLjD3RlqZt2cVu_7sPLgFKKlFApDYKd5fiOEyepTW1fIX4A_xvToCJ1wepIZ843MzrH6NAHDwh9pOQrJaT9lihlbVsRJipKayKq5gCNaN2yquPi7hCNiGSyahhlR-g4pQ0hBZNshJ7GHk_8WnsDPZ4Nu-zwOOfolkMGfK5TcRdxSLlo8bXZ4jkkl_ILgD9PZueL-RdsQ8R5DfgXmCECnochO7_CwRbHpzK8Dj0k7Dy-dRF2kNK_AeSHELen6IPVuwRnr3qCbr5PFhc_qunPy6uL8bQynMpcdURryjq2NNSQhrdScwq2JxQaa5dS9NYI0YJkPSei7oyWTVsva2644LyzwE_Qp_3e-xj-DJCy2oQh-nJScVY3XSs4kyXV7VMmhpQiWGVc1tkFn6N2O0WJeild7UtXpXT1t3TVFJT9h95H91vHx_chvodSCfsVxLev3qGeAdu-lm4 |
| CitedBy_id | crossref_primary_10_1038_s41598_025_07999_z crossref_primary_10_1016_j_pmcj_2024_101993 crossref_primary_10_1038_s41598_025_03558_8 |
| Cites_doi | 10.1016/j.jer.2023.100058 10.1109/TDSC.2011.58 10.1016/j.asoc.2015.12.028 10.1007/s11276-018-1879-9 10.1155/2016/2089714 10.54905/disssi/v20i53/e22ije1651 10.1007/s11277-020-07737-w 10.1109/TVT.2014.2313865 10.1109/TNET.2004.833122 10.1007/978-3-319-99007-1_38 10.1371/journal.pone.0139326 10.1155/2017/4724852 10.5121/ijcis.2014.4203 10.17586/2226-1494-2023-23-4-711-719 10.1002/sec.1243 10.1109/TPDS.2008.258 10.54905/disssi.v21i55.e1ije1675 10.1051/matecconf/2018173 10.1109/ICC.2004.1313226 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. |
| DBID | AAYXX CITATION 8FE 8FG ABJCF AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS |
| DOI | 10.1007/s11277-024-11504-6 |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Computer Science Database |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Journalism & Communications Engineering |
| EISSN | 1572-834X |
| EndPage | 2407 |
| ExternalDocumentID | 10_1007_s11277_024_11504_6 |
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29R 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEGXH AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARCEE ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BGNMA BSONS CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EDO EIOEI EJD ESBYG FD6 FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P9P PF0 PT4 PT5 QOK QOS R4E R89 R9I RHV RIG RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCV SDH SDM SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC TUS U2A U5U UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7X Z7Z Z81 Z83 Z88 Z8M Z8N Z8R Z8T Z8U Z8W Z92 ZMTXR _50 ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABJCF ABRTQ ACSTC ADHKG AEZWR AFDZB AFFHD AFHIU AFKRA AFOHR AGQPQ AHPBZ AHWEU AIXLP ARAPS ATHPR AYFIA BENPR BGLVJ CCPQU CITATION HCIFZ K7- M7S PHGZM PHGZT PQGLB PTHSS 8FE 8FG AZQEC DWQXO GNUQQ JQ2 L6V P62 PKEHL PQEST PQQKQ PQUKI PRINS |
| ID | FETCH-LOGICAL-c319t-80aa1282bc1c06379a31efd01e6ffb94dfc447e92d30458ca9675b53c34338fe3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 3 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001282677500002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0929-6212 |
| IngestDate | Sun Nov 30 04:23:33 EST 2025 Sat Nov 29 05:18:33 EST 2025 Tue Nov 18 21:26:38 EST 2025 Fri Feb 21 02:38:29 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Detection rate Attack resistance Trusted metrics Secure routing |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-80aa1282bc1c06379a31efd01e6ffb94dfc447e92d30458ca9675b53c34338fe3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-9395-9493 |
| PQID | 3256874329 |
| PQPubID | 2043826 |
| PageCount | 11 |
| ParticipantIDs | proquest_journals_3256874329 crossref_citationtrail_10_1007_s11277_024_11504_6 crossref_primary_10_1007_s11277_024_11504_6 springer_journals_10_1007_s11277_024_11504_6 |
| PublicationCentury | 2000 |
| PublicationDate | 20240800 2024-08-00 20240801 |
| PublicationDateYYYYMMDD | 2024-08-01 |
| PublicationDate_xml | – month: 8 year: 2024 text: 20240800 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Dordrecht |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Wireless personal communications |
| PublicationTitleAbbrev | Wireless Pers Commun |
| PublicationYear | 2024 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Kaur, Gill, Dhaliwal (CR11) 2016; 1 Kanade, Ranganthan, Babu, Ramachandran, Kusuma, Anand, Reddy (CR16) 2024; 21 Zhan, Shi, Deng (CR14) 2012; 9 Shaikh, Jameel, Auriol, Lee (CR4) 2009; 20 Yan, Zhang, Vasilakos (CR3) 2015; 9 Khan, Hussain, Devi, Gunavathie (CR19) 2023; 11 Zeng, Dong (CR5) 2016; 41 Dr, Rajaram, Karuppiah, Kumar (CR13) 2014; 4 Aldowah, Rehman, Umar (CR20) 2019; 843 CR15 Khan, Anandharaj (CR6) 2022; 12 Fagbohunmi, Okafor (CR23) 2023; 20 Khan, Devi, Devi (CR18) 2023; 23 CR12 Jhaveri, Patel, Jinwala (CR1) 2012; 11 Mustafa, Parthasarathy (CR7) 1904; 26 CR10 Ali, Hussain, Rao, Lavanya, Khan (CR17) 2024; 5 Zhang, Chen, Tian, Zhang (CR21) 2015; 10 Wei, Tang, Yu, Wang, Mason (CR2) 2014; 63 Mustafa, Parthasarathy (CR8) 2021; 116 Chang, Tassiulas (CR9) 2004; 12 Ishmanov, Zikria (CR22) 2017; 2017 Z Yan (11504_CR3) 2015; 9 J-H Chang (11504_CR9) 2004; 12 G Zhan (11504_CR14) 2012; 9 G Zhang (11504_CR21) 2015; 10 UH Jhaveri (11504_CR1) 2012; 11 GS Fagbohunmi (11504_CR23) 2023; 20 RA Shaikh (11504_CR4) 2009; 20 MM Mustafa (11504_CR7) 1904; 26 11504_CR12 A Kanade (11504_CR16) 2024; 21 11504_CR10 S Dr (11504_CR13) 2014; 4 F Ishmanov (11504_CR22) 2017; 2017 MM Mustafa (11504_CR8) 2021; 116 H Aldowah (11504_CR20) 2019; 843 AA Ali (11504_CR17) 2024; 5 ABF Khan (11504_CR6) 2022; 12 ABF Khan (11504_CR19) 2023; 11 Z Wei (11504_CR2) 2014; 63 B Zeng (11504_CR5) 2016; 41 J Kaur (11504_CR11) 2016; 1 11504_CR15 ABF Khan (11504_CR18) 2023; 23 |
| References_xml | – volume: 11 start-page: 100058 year: 2023 ident: CR19 article-title: DDoS attack modeling and resistance using trust-based protocol for the security of Internet of Things publication-title: Journal of Engineering Research doi: 10.1016/j.jer.2023.100058 – volume: 9 start-page: 184 issue: 2 year: 2012 end-page: 197 ident: CR14 article-title: Design and implementation of TARF: A trust-aware routing framework for WSNs publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2011.58 – volume: 41 start-page: 135 year: 2016 end-page: 147 ident: CR5 article-title: An improved harmony search based energy-efficient routing algorithm for wireless sensor networks publication-title: Applied Soft Computing doi: 10.1016/j.asoc.2015.12.028 – volume: 26 start-page: 1897 year: 1904 ident: CR7 article-title: A design and implementation of polling TDMA with a comparative analysis with time division multiple access for sporting application publication-title: Wireless Networks doi: 10.1007/s11276-018-1879-9 – volume: 1 start-page: 9 year: 2016 ident: CR11 article-title: Secure trust based key management routing framework for wireless sensor networks publication-title: Journal of Engineering doi: 10.1155/2016/2089714 – ident: CR15 – volume: 20 start-page: 1 issue: 53 year: 2023 end-page: 13 ident: CR23 article-title: An improved model for comparing different endpoint detection and response tools for mitigating insider threat publication-title: Indian Journal of Engineering doi: 10.54905/disssi/v20i53/e22ije1651 – volume: 116 start-page: 767 year: 2021 end-page: 775 ident: CR8 article-title: A Clustering TDMA and code block binding algorithms to enhance the node energy and security of the network publication-title: Wireless Personal Communications doi: 10.1007/s11277-020-07737-w – volume: 63 start-page: 4647 issue: 9 year: 2014 end-page: 4658 ident: CR2 article-title: Security enhancements for mobile adhoc networks with trust management using uncertain reasoning publication-title: IEEE Transactions on Vehicular Technology doi: 10.1109/TVT.2014.2313865 – volume: 12 start-page: 609 issue: 4 year: 2004 end-page: 619 ident: CR9 article-title: Maximum lifetime routing in wireless sen-sor networks publication-title: IEEE/ACM Trans. on Networking doi: 10.1109/TNET.2004.833122 – ident: CR12 – volume: 843 start-page: 396 year: 2019 end-page: 405 ident: CR20 article-title: “Security in internet of things: Issues, challenges and solutions”, IRICT 2018 publication-title: AISC doi: 10.1007/978-3-319-99007-1_38 – ident: CR10 – volume: 11 start-page: 1 issue: 1 year: 2012 end-page: 12 ident: CR1 article-title: Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs publication-title: INFOCOMP Journal of Computer Science – volume: 5 start-page: 4 issue: 1 year: 2024 ident: CR17 article-title: Enhancing security in the Internet of Things: A trust-based protocol for resilient communication publication-title: SN Computer Science – volume: 10 start-page: 0139326 issue: 9 year: 2015 ident: CR21 article-title: Using trust to establish a secure routing model in cognitive radio network publication-title: PLOS ONE doi: 10.1371/journal.pone.0139326 – volume: 2017 start-page: 1 year: 2017 end-page: 16 ident: CR22 article-title: Trust mechanisms to secure routing in wireless sensor networks: Current state of the research and open research issues publication-title: Journal of Sensors doi: 10.1155/2017/4724852 – volume: 12 start-page: 2289 issue: 1 year: 2022 ident: CR6 article-title: Multi-layer security model for DDoS detection in the internet of things publication-title: International Journal of Automation and Smart Technology – volume: 4 start-page: 27 year: 2014 end-page: 36 ident: CR13 article-title: Secure routing path using trust values for wireless sensor networks publication-title: International Journal on Cryptography and Information Security doi: 10.5121/ijcis.2014.4203 – volume: 23 start-page: 711 issue: 4 year: 2023 end-page: 719 ident: CR18 article-title: An enhanced AES-GCM based security protocol for securing the IoT communication publication-title: Scientific and Technical Journal of Information Technologies, Mechanics and Optics doi: 10.17586/2226-1494-2023-23-4-711-719 – volume: 9 start-page: 3059 year: 2015 end-page: 3069 ident: CR3 article-title: A security and trust framework for virtualized networks and software-defined networking publication-title: Security and Communication Networks doi: 10.1002/sec.1243 – volume: 20 start-page: 1698 issue: 11 year: 2009 end-page: 1712 ident: CR4 article-title: Group based trust management scheme for clustered wireless sensor networks publication-title: IEEE Transactions on Parallel and Distributed Systems doi: 10.1109/TPDS.2008.258 – volume: 21 start-page: 1 year: 2024 end-page: 12 ident: CR16 article-title: Analysis of wireless network security in Internet of Things and its applications publication-title: Indian Journal of Engineering doi: 10.54905/disssi.v21i55.e1ije1675 – volume: 12 start-page: 609 issue: 4 year: 2004 ident: 11504_CR9 publication-title: IEEE/ACM Trans. on Networking doi: 10.1109/TNET.2004.833122 – volume: 4 start-page: 27 year: 2014 ident: 11504_CR13 publication-title: International Journal on Cryptography and Information Security doi: 10.5121/ijcis.2014.4203 – volume: 9 start-page: 184 issue: 2 year: 2012 ident: 11504_CR14 publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2011.58 – ident: 11504_CR12 doi: 10.1051/matecconf/2018173 – volume: 23 start-page: 711 issue: 4 year: 2023 ident: 11504_CR18 publication-title: Scientific and Technical Journal of Information Technologies, Mechanics and Optics doi: 10.17586/2226-1494-2023-23-4-711-719 – volume: 9 start-page: 3059 year: 2015 ident: 11504_CR3 publication-title: Security and Communication Networks doi: 10.1002/sec.1243 – volume: 12 start-page: 2289 issue: 1 year: 2022 ident: 11504_CR6 publication-title: International Journal of Automation and Smart Technology – volume: 1 start-page: 9 year: 2016 ident: 11504_CR11 publication-title: Journal of Engineering doi: 10.1155/2016/2089714 – volume: 41 start-page: 135 year: 2016 ident: 11504_CR5 publication-title: Applied Soft Computing doi: 10.1016/j.asoc.2015.12.028 – volume: 843 start-page: 396 year: 2019 ident: 11504_CR20 publication-title: AISC doi: 10.1007/978-3-319-99007-1_38 – volume: 11 start-page: 100058 year: 2023 ident: 11504_CR19 publication-title: Journal of Engineering Research doi: 10.1016/j.jer.2023.100058 – volume: 2017 start-page: 1 year: 2017 ident: 11504_CR22 publication-title: Journal of Sensors doi: 10.1155/2017/4724852 – ident: 11504_CR15 – volume: 21 start-page: 1 year: 2024 ident: 11504_CR16 publication-title: Indian Journal of Engineering doi: 10.54905/disssi.v21i55.e1ije1675 – volume: 11 start-page: 1 issue: 1 year: 2012 ident: 11504_CR1 publication-title: INFOCOMP Journal of Computer Science – volume: 5 start-page: 4 issue: 1 year: 2024 ident: 11504_CR17 publication-title: SN Computer Science – volume: 63 start-page: 4647 issue: 9 year: 2014 ident: 11504_CR2 publication-title: IEEE Transactions on Vehicular Technology doi: 10.1109/TVT.2014.2313865 – volume: 26 start-page: 1897 year: 1904 ident: 11504_CR7 publication-title: Wireless Networks doi: 10.1007/s11276-018-1879-9 – volume: 116 start-page: 767 year: 2021 ident: 11504_CR8 publication-title: Wireless Personal Communications doi: 10.1007/s11277-020-07737-w – volume: 20 start-page: 1 issue: 53 year: 2023 ident: 11504_CR23 publication-title: Indian Journal of Engineering doi: 10.54905/disssi/v20i53/e22ije1651 – volume: 20 start-page: 1698 issue: 11 year: 2009 ident: 11504_CR4 publication-title: IEEE Transactions on Parallel and Distributed Systems doi: 10.1109/TPDS.2008.258 – ident: 11504_CR10 doi: 10.1109/ICC.2004.1313226 – volume: 10 start-page: 0139326 issue: 9 year: 2015 ident: 11504_CR21 publication-title: PLOS ONE doi: 10.1371/journal.pone.0139326 |
| SSID | ssj0010092 |
| Score | 2.3632455 |
| Snippet | High-level security is crucial for protecting sensitive information transmitted across wireless sensor networks (WSNs). Secure routing plays a key role in... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 2397 |
| SubjectTerms | Algorithms Behavior Communication channels Communications Engineering Computer Communication Networks Data encryption Data transmission Energy consumption Engineering Internet of Things Network security Networks Nodes Quality of service Routing (telecommunications) Sensors Signal,Image and Speech Processing Trust Trustworthiness Wireless sensor networks |
| SummonAdditionalLinks | – databaseName: Computer Science Database dbid: K7- link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LTxsxEB5R6KEcyquIlIfmgFAraoG9m2x8QgEFIQERQmnFbeXXigjYABv6D_q_GXudBCrBhdNKfuyuNGN_nz0vgO3EOK1tJkh59x1LtU6YbDUtI2xRymXaNYPL_5-zrNdrX13Ji3jhVkW3yvGeGDZqOzT-jnwvIWxuE9wJeXD_wHzVKG9djSU0PsEcF4J7PT_N2MSK4BMKhVx73sWD9ugYNFOHznFvvCSEYp4Tpaz1GpimbPM_A2nAneOFj_7xInyNjBM7tYoswYwrl2H-RR7CZViPgwbVHe7gq5iRagX-dUrsltfBVQBDwC52RnWhLIeHhIIW-z5yg57UrswNXrrK01KagD-654f9y59I3BiJa2K433foHZHo0zgsqKWsqLM3tK7CQYneH_eW9t9JR-2o_g1-H3f7RycsVm9ghpb1iKBPKQI_oQ03xIMyqRLuCrvPXasotExtYdI0c1LYYKw1StLZRTcTk6R0bC5csgqz5bB0a4BSGMVVItrayJSnSunC09impcN9YYVuAB-LLjcxtbmvsHGbT5Mye3HnJO48iDtvNWB3Mue-Tuzx7uiNsYzzuMirfCrgBvwaa8m0--23fX__bevwRXjFDG6GGzA7enxym_DZ_B0NqsetoOLPt54AwQ priority: 102 providerName: ProQuest |
| Title | An Enhanced Multi Attribute Based Trusted Attack Resistance (EMBTR) for the Secure Routing of Sensor Nodes in Wireless Sensor Network |
| URI | https://link.springer.com/article/10.1007/s11277-024-11504-6 https://www.proquest.com/docview/3256874329 |
| Volume | 137 |
| WOSCitedRecordID | wos001282677500002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1572-834X dateEnd: 20241208 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: K7- dateStart: 20230101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Engineering Database customDbUrl: eissn: 1572-834X dateEnd: 20241208 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: M7S dateStart: 20230101 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest advanced technologies & aerospace journals customDbUrl: eissn: 1572-834X dateEnd: 20241208 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: P5Z dateStart: 20230101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1572-834X dateEnd: 20241208 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: BENPR dateStart: 20230101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLink Journals customDbUrl: eissn: 1572-834X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB58HfTgW6ytZQ4iigbMq-keW6kIaim1ingJ-woWNRVT_Qf-b2e3Sauigl4SyD4SmJmdbzPfzALs-FILoSKPlPdIO4EQvsNqoXLIt3CuI6FDS_m_Po_a7frNDevkSWFZwXYvQpJ2pZ4ku7km3Eg-xTEoJnBq0zBL7q5uzLF7eT2OHZgyQrbCniF20Mqcp8p8P8dndzTBmF_CotbbnCz97zuXYTFHl9gYqcMKTOl0FRY-1BxchXLeqZ894i5-yg_J1uCtkWIrvbO0ALTJudgYjg7F0tgkj6ewZ7I06E7PubzHrs4MBKUBuNe6aPa6-0g4GAlXov2Xr9GQjujVOEjoSZpRY3ugdIb9FA339oHW2nHDiJS-Dlcnrd7xqZOf1OBIMuEhuTnOydF5QrqSME_EuO_qRB25upYkggUqkUEQaeYpG5iVnNE-RYS-9APaIifa34CZdJDqTUDmSe5y36sLyQI34FwkBrKGijbyifJECdxCYLHMy5ib0zQe4kkBZiOAmAQQWwHEtRIcjMc8jYp4_Nq7UuhBnBt0FvsEDeuEtjxWgsNC7pPmn2fb-lv3Msx7RnUsxbACM8PnF70Nc_J12M-eqzDbbLU73SpMn0VO1fBUL-naCW-r1gTeAfjv-z4 |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VggQceBQQoQXmAAgEK-LdjZ09IJRCqlZNI1SFqjezL4uI4pQ6gPgB_B1-I7NrO6FI9NYDJ0veh631t_PNel4Aj4T1xriME3i7nkljBFNpzzHiFq19ZnwvuvwfjLLxuH94qN6twK82Fia4VbYyMQpqN7PhH_lLQdzcJ7rj6vXxFxaqRgXraltCo4bFrv_xnY5s1audt_R9H3O-NZy82WZNVQFmCW5zEslak1DmxiaW-DlTWiS-cN3Ep0VhlHSFlTLzirtoRLRakU5tesIKSce5wgua9wJclILeJhiBM7awWoQERjG3X3ApIU5ognTqUL0kGEuJEVnQwSRLTxPhUrv9yyAbeW7r-v-2QjfgWqNR46DeAjdhxZdrcPWPPItrsN50mlaf8QmeiompbsHPQYnD8mN0hcAYkIyDeV0IzOMmsbzDSYhMoSvd1_YT7vsqqN00AJ8O9zYn-8-QdH8kXRqj_cJjcLSiR-OsoDtlRY3jmfMVTksM_sZHxC-LhtoR_za8P5dVugOr5az0dwEVtzrRgveNVTKRWpsiqOk915Vp4bjpQNJCJbdN6vZQQeQoXyadDvDKCV55hFeeduD5YsxxnbjkzN4bLabyRohV-RJQHXjRonLZ_O_Z7p0920O4vD3ZG-WjnfHuOlzhYVNEl8oNWJ2ffPX34ZL9Np9WJw_i9kL4cN5o_Q0Iil1r |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1ZT9tAEB5xVIg-AOUQKdc8VFURWGB7E2cfAyQClUaIBsSbtaeIAAdht_-A_83s2kmgKkiIJ0t72dLM7nzr-WYG4FusjJQ6iUh5903ApIwD3qjrgGyLECaRpu4p_5enSbfbvLriZ8-i-D3bfeiSLGMaXJamrNi713ZvHPgWOtcj2ZfAIRoWNCZhmrmiQe6-_vty5EdwKYV8tj1H8qBTugqb-f8aL03TGG_-4yL1lqcz__FvXoC5CnViq1STLzBhskX4_CwX4SKsVYP6-R1-xxdxI_kSPLYybGfXni6APmgXW0VZLMvgAVlCjT0XvUFPahfqBs9N7qApTcAf7V8HvfNtJHyMhDfR_-M36MhI9GocWGrJcursDrTJsZ-h4-Te0hk86ijJ6stw0Wn3Do-DqoJDoGhrF2T-hCADGEkVKsJCCRdxaKzeD03DWsmZtoqxxPBIe4etEpzuL7Ieq5jR1dmaeAWmskFmVgF5pEQo4qgpFWchE0JaB2Xrmi74VkeyBuFQeKmq0pu7Khu36TgxsxNASgJIvQDSRg12RnPuy-Qeb45eH-pEWm30PI0JMjYJhUW8BrtDHRh3v77a1_cN34KZs6NOenrS_bkGs5HTIs9CXIep4uGP2YBP6m_Rzx82vf4_AXJYArM |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Enhanced+Multi+Attribute+Based+Trusted+Attack+Resistance+%28EMBTR%29+for+the+Secure+Routing+of+Sensor+Nodes+in+Wireless+Sensor+Network&rft.jtitle=Wireless+personal+communications&rft.au=Feroz+Khan%2C+A.+B.&rft.date=2024-08-01&rft.pub=Springer+US&rft.issn=0929-6212&rft.eissn=1572-834X&rft.volume=137&rft.issue=4&rft.spage=2397&rft.epage=2407&rft_id=info:doi/10.1007%2Fs11277-024-11504-6&rft.externalDocID=10_1007_s11277_024_11504_6 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0929-6212&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0929-6212&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0929-6212&client=summon |