Research Article
LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System
Table 1
Notation and description.
| Notations | Description |
| SN | Sensor node | CH | Cluster head | | Trust value | Λ | Weight factor for overall trust calculation | t | Time | μ | Weight factor for updating trust | | Number of messages received | | Energy consumed | | Number of successful transmissions | | Back-off time | | Hop count | | Relative deviation | | Recommendation | α | Weight factor for calculation | β | Weight factor for calculation |
|
|