Towards Trust-based Security Mechanism for Wireless Sensor Networks

被引:0
|
作者
Gao, Jianqiao [1 ]
Pan, Julong [1 ]
Xu, Zhanyi [1 ]
Li, Ziyin [2 ]
机构
[1] China Jiliang Univ, Coll Informat Engn, Hangzhou 310018, Peoples R China
[2] China Jiliang Univ, Coll Opt Engn, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
wireless sensor networks; trust; security; reputation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks(WSNs) bring together many applications and disciplines to capture the most intensive economical development of the century. The objective of this paper is to provide a snapshot of the trust-based security mechanism for WSNs. Three kinds of trust information are summarized. After analyzing the security problems and brief reviewing of the trust management for WSNs, a comparing study with two typical trust management models are given with the consideration of energy conservation. Experiment result shows that the new ones prolong the networks lifetime.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Trust-based security for wireless ad hoc and sensor networks
    Boukerch, A.
    Xu, L.
    El-Khatib, K.
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2413 - 2427
  • [2] Trust-based security adaptation mechanism for Vehicular Sensor Networks
    Javed, Muhammad Awais
    Zeadally, Sherali
    Hamid, Zara
    [J]. COMPUTER NETWORKS, 2018, 137 : 27 - 36
  • [3] Trust-based framework for security enhancement of wireless sensor
    Oleshchuk, Vladimir
    [J]. IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 623 - 627
  • [4] A Trust-based Security Aware Congestion Control Algorithm for Wireless Sensor Networks
    Pandey, Divya
    Kushwaha, Vandana
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2022, 54 (3-4) : 249 - 290
  • [5] Trust-based LEACH Protocol for Wireless Sensor Networks
    Song, Fei
    Zhao, Baohua
    [J]. FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 200 - 205
  • [6] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [7] Trust-based backpressure routing in wireless sensor networks
    Venkataraman, Revathi
    Moeller, Scott
    Krishnamachari, Bhaskar
    Rao, T. Rama
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2015, 17 (01) : 27 - 39
  • [8] Trust-based secure aggregation in wireless sensor networks
    Hur, Junbeom
    Lee, Yoonho
    Hong, Seongmin
    Yoon, Hyunsoo
    [J]. 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 1 - 6
  • [9] Trust security mechanism for maritime wireless sensor networks
    Walid, Elgenaidi
    Thomas, Newe
    Eoin, O'Connell
    Gerard, Dooly
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [10] Trust Security Mechanism for Marine Wireless Sensor Networks
    Elgenaidi, Walid
    Newe, Thomas
    [J]. PROCEEDINGS OF THE 2015 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2015, 5 : 1203 - 1208