WSN trust models evaluation in the context of the IoT

被引:0
|
作者
Wang, Jingpei [1 ]
Sun, Bin [1 ]
Yang, Yu [1 ,2 ]
Niu, Xinxin [1 ,2 ]
机构
[1] Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
[2] National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
来源
关键词
Internet of things - Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
This paper evaluates several traditional trust models for WSN(Wireless Sensor Network)in the context of the IoT(Internet of Things). The evaluated parameters are extracted from a concrete context, which is establishing the trust relationship between remote nodes after the WSN being integrated into the IoT. As an extension, the Ad hoc trust model is also evaluated. The evaluation and the simulation results show that possible trust models are suited for IoT on condition that several restrictions are available. The evaluated method and results provide a reasonable reference for the establishment of trust model for IoT.
引用
收藏
页码:3109 / 3116
相关论文
共 50 条
  • [21] Study and Performance Evaluation of Mobility Models in MANET and WSN
    Keerthi, D. S.
    Chaithanyaranga, H., V
    Shreedevi, P.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2016, : 297 - 301
  • [22] Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments
    Miettinen, Markus
    Huang, Jialin
    Thien Duc Nguyen
    Asokan, N.
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16), 2016, : 225 - 226
  • [23] Context-Aware Trust Management System for IoT Applications with Multiple Domains
    Le, Nan
    Varadharajan, Vijay
    Nepal, Surya
    2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, : 1138 - 1148
  • [24] Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks
    Singh, Jagdeep
    Dhurandher, Sanjay Kumar
    Woungang, Isaac
    Chao, Han-Chieh
    Sensors, 2024, 24 (23)
  • [25] PERFORMANCE EVALUATION OF SA-LA ROUTING PROTOCOL FOR WSN INTEGRATED IOT
    Dongarsane, Chettan Rajan
    Kumar, D. Mahesh
    Sankpal, Swati
    SURANAREE JOURNAL OF SCIENCE AND TECHNOLOGY, 2023, 30 (02):
  • [26] Context-Aware Trust and Reputation Model for Fog-Based IoT
    Hussain, Yasir
    Zhiqiu, Huang
    Akbar, Muhammad Azeem
    Alsanad, Ahmed
    Alsanad, Abeer Abdul-Aziz
    Nawaz, Asif
    Khan, Izhar Ahmed
    Khan, Zaheer Ullah
    IEEE ACCESS, 2020, 8 : 31622 - 31632
  • [27] Context-Aware Trust and Reputation Model for Fog-Based IoT
    Hussain, Yasir
    Zhiqiu, Huang
    Akbar, Muhammad Azeem
    Alsanad, Ahmed
    Alsanad, Abeer Abdul-Aziz
    Nawaz, Asif
    Khan, Izhar Ahmed
    Khan, Zaheer Ullah
    IEEE Access, 2020, 8 : 31622 - 31632
  • [28] On trust models and trust evaluation metrics for ad hoc networks
    Theodorakopoulos, G
    Baras, JS
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 318 - 328
  • [29] Machine Learning Empowered Trust Evaluation Method for IoT Devices
    Ma, Wei
    Wang, Xing
    Hu, Mingsheng
    Zhou, Qinglei
    IEEE ACCESS, 2021, 9 : 65066 - 65077
  • [30] Fuzzy Logic based security trust evaluation for IoT environments
    Khalil, Ahmad
    Mbarek, Nader
    Togni, Olivier
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,