
Trust-based Routing Protocols in Wireless Networks
Author(s) -
S. SriGowthem
Publication year - 2021
Publication title -
türk bilgisayar ve matematik eğitimi dergisi
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.218
H-Index - 3
ISSN - 1309-4653
DOI - 10.17762/turcomat.v12i1s.1931
Subject(s) - computer science , wireless sensor network , flooding (psychology) , overhead (engineering) , computer network , key (lock) , wireless , computer security , telecommunications , psychology , psychotherapist , operating system
the Wireless sensor Networks is usually consisting of all-inclusive amount of bound sensor accessories which are announced in balance of the wireless media. As WSN’s become added and added capital to accustomed life, their aegis and assurance become a primary concern. However because of the attributes of WSNs, aegis architecture can be challenging. Trust-aware acquisition protocols play a capital role in aegis of Wireless Sensor Networks (WSNs). The key allotment of the acquisition agreement is avenue alternative based on account theory. Our after-effects announce that trust-based geographic acquisition approaches the ideal achievement akin accessible by flooding-based acquisition in bulletin supply arrangement and bulletin adjournment after incurring abundant bulletin overhead.