Research Article

[Retracted] A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management

Table 1

Comparison of ability of wireless sensor network security routing model to deal with various attacks.

ATSRTSRTSRFEDTMTSSRM

For routing protocolBlack hole attack×
Grey hole attack×
Slot attack××
Information tampering attack
Energy consumption attack××
For trust managementOn-off attack×
Contradictory behavior attack××
Unfair evaluation attack
Collusion attack××××
Selfish attack×××