Reasoning about trust and reputation system to coordinate wireless sensor networks

被引:0
|
作者
机构
[1] Computer School Yangtze University
来源
Yang, Q. | 1600年 / Asian Network for Scientific Information卷 / 12期
关键词
Intrusion detection; Reputation; Turst management; Wireless sensor networks;
D O I
10.3923/itj.2013.6686.6693
中图分类号
学科分类号
摘要
Due to the nature of the WSN and the extreme resource constraints of sensor devices, providing secure, efficient and user-friendly trust initialization is a challenging task. This study identify a coordination communication model which characterizes trust groups in order to promote safe interactions in the ubiquitous environment. Through the proposed TRSCM (Trust and Reputation System for Communication Management), a group of sensor devices that have no pre-shared secrets, establish initial trust by generating various shared secret keys out of an unauthenticated channel. The dynamics of trust group creation, evolution and termination are described, in terms of the history of interactions of the device and on the ontology used to encode the context of trust. After the reasoning the security of the proposed protocols, we implement the middleware on a network testbed and report performance evaluation results. ©2013 Asian Network for Scientific Information.
引用
收藏
页码:6686 / 6693
页数:7
相关论文
共 50 条
  • [31] Trust Model of Wireless Sensor Networks and Its Application in Data Fusion
    Chen, Zhenguo
    Tian, Liqin
    Lin, Chuang
    SENSORS, 2017, 17 (04)
  • [32] Trust-based security for wireless ad hoc and sensor networks
    Boukerch, A.
    Xu, L.
    El-Khatib, K.
    COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2413 - 2427
  • [33] A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks
    Basan, Alexander
    Basan, Elena
    Makarevich, Oleg
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 369 - 372
  • [34] BLTM: Beta and LQI Based Trust Model for Wireless Sensor Networks
    Wu, Xiaoling
    Huang, Junjie
    Ling, Jie
    Shu, Lei
    IEEE ACCESS, 2019, 7 : 43679 - 43690
  • [35] Performance Comparison of Trust Based Clustering Protocols for Wireless Sensor Networks
    Sharma, Richa
    Vashisht, Vasudha
    Singh, Umang
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 642 - 647
  • [36] Towards Trust-based Security Mechanism for Wireless Sensor Networks
    Gao, Jianqiao
    Pan, Julong
    Xu, Zhanyi
    Li, Ziyin
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [37] A self-adaptive trust management scheme for wireless sensor networks
    Wu, Xu
    Zheng, Qinghua
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2015, 37 (10) : 1197 - 1206
  • [38] Integration of Wireless Sensor Network and Cloud Computing Using Trust and Reputation Technique
    Buddesab
    Bhavyashree, S. P.
    Thriveni, J.
    Venugopal, K. R.
    EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY, ICERECT 2018, 2019, 545 : 69 - 82
  • [39] An intrusion detection system for wireless sensor networks
    Onat, I
    Miri, A
    WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 253 - 259
  • [40] Trust Based Authentication Mechanism in Wireless Sensor Networks
    Li, Ru-ping
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (01) : 58 - 63