Research on the Data Fusion of Wireless Sensor Network Based on Credibility

Article Preview

Abstract:

The research on design of data fusion with safety credibility is a hot problem in wireless sensor networks. This paper presents a design of wireless sensor data fusion based on reputation, through the combination of data sensing and data fusion detection, it complete the data fusion algorithm and carries out the simulation test to verify the validity of this research.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1113-1115

Citation:

Online since:

July 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Hani, et al. Taxonomy of secure data aggregation in wireless sensor networks. International. Journal of Communication Networks and Distl-ibuted Systems, 2012, 8(1): 101-148.

Google Scholar

[2] J. Xiong, L. Xuan, T. Huang, Secure sensitive data transmission in wireless sensor network based on compressive sensing. In Proceedings of the 2011 International Conference on Electrical. Information Engineering and Mechatronics, 2011: 569-576.

DOI: 10.1007/978-1-4471-2467-2_66

Google Scholar

[3] A. Pemig, et al. SPINS: security protocols for sensor networks. Journal of Wireless Networks, 2012, 8(5): 521-534.

Google Scholar

[4] C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in Proc. of the Second ACM Conference on Embedded Networked Sensor Systems, 2010: 162-175.

DOI: 10.1145/1031495.1031515

Google Scholar

[5] H. Cam, S. Ozdemir. False data detection and secure data aggregation in wireless sensornetworks. Security in Distributed, Grid, Mobile and Pervasive Computing. Auerbach Publications, 2010: 1101-1106.

DOI: 10.1201/9780849379253.ch7

Google Scholar

[6] S. Ozdemir, H. Cam. Key establishment with source coding and reconciliation for wireless sensor networks. In: Froc of IEEE IPCCC, 2010: 55-63.

DOI: 10.1109/.2006.1629433

Google Scholar

[7] J. M. David, et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In the 1st IEEE International Conference on Sensor and Ad hoc Communications and Networks. Santa Clara, California, 2010: 58-67.

DOI: 10.1109/sahcn.2004.1381904

Google Scholar