no code implementations • 21 Jul 2022 • Liu Yang, Yinzhi Lu, Simon X. Yang, Yuanchang Zhong, Tan Guo, Zhifang Liang
To acquire secured data delivery and address the conflict between security and energy, in this paper we present an evolutionary game based secure clustering protocol with fuzzy trust evaluation and outlier detection for WSNs.
no code implementations • 20 Jul 2022 • Liu Yang, Yinzhi Lu, Simon X. Yang, Tan Guo, Zhifang Liang
And then a density based outlier detection mechanism is introduced to acquire an adaptive trust threshold used to isolate the malicious nodes from being cluster heads.