Trust Models in Wireless Sensor Networks for Defending Against Denial-of-service Attacks: A Literature Review
| aut.relation.articlenumber | 3075 | |
| aut.relation.endpage | 3075 | |
| aut.relation.issue | 6 | |
| aut.relation.journal | Applied Sciences | |
| aut.relation.startpage | 3075 | |
| aut.relation.volume | 15 | |
| dc.contributor.author | Wang, Lijuan | |
| dc.contributor.author | Petrova, Krassie | |
| dc.contributor.author | Yang, Mee Loong | |
| dc.date.accessioned | 2025-03-19T22:44:22Z | |
| dc.date.available | 2025-03-19T22:44:22Z | |
| dc.date.issued | 2025-03-12 | |
| dc.description.abstract | Denial-of-service (DoS) attacks pose a significant threat to wireless sensor networks (WSNs) and are an impediment to their mass deployment. Current research has identified trust models as a plausible defense against DoS attacks. However, most of the proposed solutions focus only on one or two specific DoS attack scenarios and provide very limited guidance to a WSN with regard to important practical aspects, such as setting up threshold configurations and weight allocation schemes. This study conducts a comparative analysis of relevant work to build a foundation for the development of robust trust models that can counter a range of different types of DoS attacks in WSNs. In particular, this study examines the required trust evidence, the methods for extracting trust evidence, and the trust evaluation techniques for developing effective trust models. This study identifies the challenges in the implementation of trust models, such as the need to determine feasible threshold limits and trust metric weightings and the need to manage the loss of trust information. In addition, this study explores link quality and node authentication as factors affecting trust evaluation and the integration of trust models with network routing protocols. | |
| dc.identifier.citation | Applied Sciences, ISSN: 2076-3417 (Print); 2076-3417 (Online), MDPI AG, 15(6), 3075-3075. doi: 10.3390/app15063075 | |
| dc.identifier.doi | 10.3390/app15063075 | |
| dc.identifier.issn | 2076-3417 | |
| dc.identifier.issn | 2076-3417 | |
| dc.identifier.uri | http://hdl.handle.net/10292/18921 | |
| dc.language | en | |
| dc.publisher | MDPI AG | |
| dc.relation.uri | https://www.mdpi.com/2076-3417/15/6/3075 | |
| dc.rights | © 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). | |
| dc.rights.accessrights | OpenAccess | |
| dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
| dc.subject | DoS attacks | |
| dc.subject | denial-of-service attacks | |
| dc.subject | trust evaluation | |
| dc.subject | trust evidence | |
| dc.subject | trust models | |
| dc.subject | wireless sensor networks, WSNs | |
| dc.title | Trust Models in Wireless Sensor Networks for Defending Against Denial-of-service Attacks: A Literature Review | |
| dc.type | Journal Article | |
| pubs.elements-id | 594529 |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Wang et al_2025_Trust models in wireless sensor networks.pdf
- Size:
- 2 MB
- Format:
- Adobe Portable Document Format
- Description:
- Journal article
