A Trusted Model in the Internet of Water Transport

Article Preview

Abstract:

With the development of wireless sensor network, it has been used in water transport. The internet of water transport is come into being and produce much of data information, so data security is necessary as one of its key technologies. This paper puts forward a new trusted architecture for wireless sensor network used in water transport. To guarantee the authenticity and reliability of the data, the concepts of subjective trust elevation and its expected probability is introduced. This model simulation experiments results approve that the model is effective and reliable.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 816-817)

Pages:

479-483

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chang E, Thomson P, Dillon T et al. The fuzzy and dynamic nature of trust [A] . LNCS 3592[ C]. Berlin: Springer-Verlag, 2005. 161- 174.

Google Scholar

[2] Marsh S. Formalizing Trust as a Computational Concept [D] . University of Stirling, (1994).

Google Scholar

[3] Go lbeck J. Computing and Applying Trust in Web-Based Social Networks [D]. University of Maryland, Co llege Park, (2005).

Google Scholar

[4] Koutrouli E, Tsalgatidou A. Reputation- based trust systems for P2P applications: design issues and comparison framework [A] . LNCS4083[C]. Berlin: Springer-Verlag, 2006. 152- 161.

DOI: 10.1007/11824633_16

Google Scholar

[5] Almenarez F, Marin A, Campo C. TrustAC: Trus-t Based access control for pervasive dev ices [ A] . LNCS 450 [C] . Berlin: Springer-Verlag. 2005. 225- 238.

Google Scholar

[6] HU X D, WE I Q F, CU I P, et a. l M ode ling on secure and efficient clustering for wireless sensor networks[C]. Proceedings of the 4th IEEE International Conference on Wireless Telecommunications, Networking and Mobile Computering (WiCOM 2008), Oct. 12-14, 2008, Da lian, China: 1-3.

DOI: 10.1109/wicom.2008.924

Google Scholar

[7] CASTELLUCC IA C, MYKLETUN E, TSUDIK G. Efficient aggregation o f encrypted data in w ireless sensor networks[C]. ACM /IEEE Mobiquitous Conference, SanDiego, USA, July 2005: 109-117.

Google Scholar

[8] PHAM, NGUYEN, R IGUIDEL, et a. l Security assurance aggregation for IT infrastructures[C]. Second International Conference on System s and Networks Communications, 2007, 25-31, Aug. 2007: 72.

DOI: 10.1109/icsnc.2007.75

Google Scholar

[9] PRZYDATEK B, SONG D, PERR IG A. SIA: secure information aggregation in sensor networks[C]. In Proc. of ACM SenSys, 2003: 255-265.

Google Scholar