z-logo
open-access-imgOpen Access
Trust-based Routing Protocols in Wireless Networks
Author(s) -
S. SriGowthem
Publication year - 2021
Publication title -
türk bilgisayar ve matematik eğitimi dergisi
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.218
H-Index - 3
ISSN - 1309-4653
DOI - 10.17762/turcomat.v12i1s.1931
Subject(s) - computer science , wireless sensor network , flooding (psychology) , overhead (engineering) , computer network , key (lock) , wireless , computer security , telecommunications , psychology , psychotherapist , operating system
the Wireless sensor Networks is usually consisting of all-inclusive amount of bound sensor accessories which are announced in balance of the wireless media. As WSN’s become added and added capital to accustomed life, their aegis and assurance become a primary concern. However because of the attributes of WSNs, aegis architecture can be challenging. Trust-aware acquisition protocols play a capital role in aegis of Wireless Sensor Networks (WSNs). The key allotment of the acquisition agreement is avenue alternative based on account theory. Our after-effects announce that trust-based geographic acquisition approaches the ideal achievement akin accessible by flooding-based acquisition in bulletin supply arrangement and bulletin adjournment after incurring abundant bulletin overhead.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here