The Authentication Method In Wireless Sensor Network Based On Trust Model

被引:0
|
作者
Voitovych, Olesia [1 ]
Kupershtein, Leonid [1 ]
Shulyatitska, Olga [1 ]
Malyushytskyy, Viktor [1 ]
机构
[1] Vinnytsia Natl Tech Univ, Informat Secur Dept, Vinnytsia, Ukraine
关键词
wireless sensor networks; WSN; authentication method; security problem; trust model; trust center; USER AUTHENTICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Existing wireless sensor network are developing rapidly and soon will occupy a dominant place among the data collection and communication. The remote location of the sensors and automatic operation increases their vulnerability to outside intrusions and attacks. Because of out of constant sensor supply the providing of authentication is quite challenging whereas the best protocols is negotiated sensor capabilities. The method of sensor authentication in the wireless sensor networks, which is based on a model of trust, is proposed.
引用
收藏
页码:993 / 997
页数:5
相关论文
共 50 条
  • [41] Distributed Trust based Intrusion Detection Approach in Wireless Sensor Network
    Dhakne, Amol R.
    Chatur, P. N.
    2015 COMMUNICATION, CONTROL AND INTELLIGENT SYSTEMS (CCIS), 2015, : 96 - 101
  • [42] Trust Intrusion Detection System Based on Location for Wireless Sensor Network
    Maddar, Hela
    Kammoun, Wafa
    Youssef, Habib
    INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA 2016), 2017, 557 : 831 - 840
  • [43] Trust Based Cluster Head Selection Algorithm for Wireless Sensor Network
    Ramalingam, L.
    Audithan, S.
    SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 453 - 457
  • [44] The mechanism of situation data fusion based on trust in wireless sensor network
    Li, Fang-Wei
    Nie, Yi-Fang
    Liu, Fan
    Zhu, Jiang
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (05): : 71 - 76
  • [45] Trust Based Cluster and Secure Routing Scheme for Wireless Sensor Network
    Thenmozhi, E.
    Audithan, S.
    SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 489 - 494
  • [46] TRUST based energy efficient routing in LEACH for wireless sensor network
    Miglani, Arzoo
    Bhatia, Tarunpreet
    Goel, Shivani
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 357 - 361
  • [47] Novel Wireless Sensor Network Intrusion Detection Method Based on LightGBM Model
    Meng, Di
    Dai, Hong
    Sun, Qiaochu
    Xu, Yao
    Shi, Tianwei
    IAENG International Journal of Applied Mathematics, 2022, 52 (04)
  • [48] An Authentication Method for Self Nodes Based on Watermarking in Wireless Sensor Networks
    Dong, Xiaomei
    Li, Xiaohua
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4529 - +
  • [49] An Authentication Model for Wireless Network Services
    Huy Hoang Ngo
    Wu, Xianping
    Phu Dung Le
    Srinivasan, Bala
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 996 - 1003
  • [50] A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value
    Chen, Zuo
    Li, Xue
    Yang, Bing
    Zhang, Qian
    JOURNAL OF SENSORS, 2015, 2015