Research on Trust Computation Models in Wireless Sensor Networks

Article Preview

Abstract:

Wireless Sensor Network security is not only threatened in the time of passing information between nodes, but also in processes of data generation. Cryptography is therefore unable to prevent attacks from nodes inside the network after those nodes have been captured. The trust model can play an important role in this aspect. It can effectively identify malicious nodes, self-ish nodes, and low competitiveness nodes in the network to improve its performance. This paper focuses on the technical characteristics of trust management and design. It classifies existing trust computation models into several types according to their computing theories at first. Then it discusses several classic trust management frameworks and analyzes their advantages and weaknesses. At last, the paper concludes general problems of current models and points out future research directions.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3007-3010

Citation:

Online since:

November 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Management [ A ]. Dale J, Dinolt G. Proceedings of the Sym posium on Security and Privacy[ C ]. Oakland: IEEE Computer Society Press, 164- 173(1996).

DOI: 10.1109/secpri.1996.502679

Google Scholar

[2] Ganeriwal S, Srivastava M. Reputation- based Framework for High Integrity Sensor Networks [A]. Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks [C], 66-77(2004).

DOI: 10.1145/1029102.1029115

Google Scholar

[3] TangWen, HuJianBin, ChenZhong,Subjective trust management model based on fuzzy logic[J],Computer Research and Development, 42(10):654-1659(2009).

Google Scholar

[4] Li De Yi, Meng Hai Jun , Shi Xue Mei. Membership cloud and cloud generator[J]. Computer Research and Development, 32(6): 15-20(1995).

Google Scholar

[5] MaBin,XieXianZhong. Cloud trust model of wireless sensor work[J] Computer science, 37(3):128-132(2010).

Google Scholar

[6] ChenJian,FengRenJian, Trust evaluation model for wireless sensor networks based on DS evidence theory[J]. Journal of Sensing Technology, 22(12): 1802-1807(2009).

Google Scholar

[7] Glenn Shafer A Mathematical Theory of Evidence [M]. Princeton: Princeton university Press . 1976 (76).

Google Scholar