Review Article

Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks

Table 1

Common applications of trust.

Representative referencesTrust data fusionTrusted routingMalicious node detection

[21]×
[22]×
[23]×
[24]×
[25]×
[26]×
[27]×
[28]×
[29]×
[30]×
[31]×
[32]×
[33]×
[34]×
[35]×
[36]×
[37]×
[38]×
[39]×
[40]×
[41]×
[42]×
[43]×
[44]×
[45]×
[46]×
[47]×
[48]×
[49]×
[50]×