Research Article
[Retracted] A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management
Table 1
Comparison of ability of wireless sensor network security routing model to deal with various attacks.
| | | ATSR | TSR | TSRF | EDTM | TSSRM |
| For routing protocol | Black hole attack | √ | √ | √ | × | √ | Grey hole attack | √ | √ | √ | × | √ | Slot attack | × | √ | √ | × | √ | Information tampering attack | √ | √ | √ | √ | √ | Energy consumption attack | √ | × | × | √ | √ | For trust management | On-off attack | √ | × | √ | √ | √ | Contradictory behavior attack | × | × | √ | √ | √ | Unfair evaluation attack | √ | | √ | √ | √ | Collusion attack | × | | × | × | × | Selfish attack | √ | | × | × | × |
|
|