For example, node A carries the message that the destination node is B, If there is no message in the cache of
Node B, then node A will not forward any message, so the efficiency of the message in the network is greatly reduced.
So, we give the definition of trust in WSNs as follows: node As trust in
node B describes the belief or expectation or assurance of sincerity, competence, and integrity of
node B's future action/behavior [12].
Node i as source node sends broadcast packet through neighbor node as home channel (represented as Ch n in Figure 1) Ch6, neighbor
node b's home channel Ch4, neighbor node c's home channel Ch1, and neighbor node d's home channel Ch3 in sequence in the sensing range [r.sub.s].
Choose a scattered node randomly in node as potential neighbors as the new node, denoting as
node b. With this strategy, the network expands outward and fills the region S as fast as possible.
Note that
node B has also been accomplishing its movement epochs.
Thus in Figure 1 when
node B sends packets to C, A along with B's neighbours observes the event.
An existing site can be configured with Horizon, Horizon II, and Motorola
Node B's.
Nodes A, D, and E are all contained by Node C, and
Node B is related to Node A.
Regarding
node B, [[phi].sub.B,-](t) = [[phi].sub.A](t) and [[phi].sub.B+](t) = [[phi].sub.C](t).
Both node A and
node B are intermediate nodes, and the buffer size of
node B is much smaller than that of node A.