DRBTS: Distributed reputation-based Beacon Trust System

被引:0
|
作者
Srinivasan, Avinash [1 ]
Teitelbaum, Joshua [1 ]
Wu, Jie [1 ]
机构
[1] Florida Atlantic Univ, Dept Comp Sci & Engn, Boca Raton, FL 33431 USA
来源
DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS | 2006年
关键词
Beacon node; malicious node; reputation; revocation; security; sensor node; trust;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless Sensor Networks (WSNs) have critical applications in diverse domains like environmental monitoring and military operations where accurate location of sensors is vital. One common method of location discovery uses a set of specialty nodes known as beacon nodes (BNs) that assist other sensor nodes (SNs) to determine their location. This paper proposes a novel reputation-based scheme called Distributed Reputation-based Beacon Trust System (DRBTS) for excluding malicious BNs that provide false location information. To the best of our knowledge, DRBTS is the first model to use the concept of reputation for excluding BNs. In DRBTS, every BN monitors its 1-hop neighborhood for misbehaving BNs and accordingly updates the reputation of the corresponding BN in the Neighbor-Reputation-Table (NRT). The BNs then,publish their NRT in their I-hop neighborhood. BNs use this second-hand information published in NRT for updating the reputation of their neighbors after it qualifies a deviation test. On the other hand, the SNs use the NRT information to determine whether or not to use a given beacon's location information, based on a simple majority voting scheme.
引用
收藏
页码:277 / +
页数:2
相关论文
共 50 条
  • [1] Reputation-based trust-aware recommender system
    Kitisin, Sukumal
    Neuman, Clifford
    2006 SECURECOMM AND WORKSHOPS, 2006, : 262 - +
  • [2] Fuzzy reputation-based trust model
    Tajeddine, Ayman
    Kayssi, Ayman
    Chehab, Ali
    Artail, Hassan
    APPLIED SOFT COMPUTING, 2011, 11 (01) : 345 - 355
  • [3] Trust and reputation-based multi-agent recommender system
    Bedi, Punam
    Agarwal, Sumit Kumar
    Richa
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (04) : 350 - 362
  • [4] Reputation-based trust management
    Shmatikov, Vitaly
    Talcott, Carolyn
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (01) : 167 - 190
  • [5] Reputation-based Distributed Knowledge Sharing System in Blockchain
    Hu, Shuang
    Hou, Lin
    Chen, Gongliang
    Weng, Jian
    Li, Jianhua
    PROCEEDINGS OF THE 15TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2018), 2018, : 476 - 481
  • [6] Study of Reputation-based Trust Management
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 1132 - 1135
  • [7] Reputation-Based Recommendation Trust Model in the Interoperable Environment
    Tang, Xiaomei
    Chen, Mengdong
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 2226 - 2228
  • [8] Reputation-Based Trust Approaches in Named Data Networking
    Kapetanidou, Ioanna Angeliki
    Sarros, Christos-Alexandros
    Tsaoussidis, Vassilis
    FUTURE INTERNET, 2019, 11 (11):
  • [9] CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
    Noor, Talal H.
    Sheng, Quan Z.
    Yao, Lina
    Dustdar, Schahram
    Ngu, Anne H. H.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (02) : 367 - 380
  • [10] Reputation-Based Security System For Edge Computing
    Nwebonyi, Francis N.
    Martins, Rolando
    Correia, Manuel E.
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,