An entropy-based trust modeling and evaluation for wireless sensor networks

被引:33
作者
Dai Hongjun [1 ]
Jia Zhiping [1 ]
Dong Xiaona [2 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Shandong, Peoples R China
[2] Earthquake Adm Shandong Province, Jinan 250014, Peoples R China
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS | 2008年
关键词
D O I
10.1109/ICESS.2008.31
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are hard to be stable and vulnerable to various attacks, so it's a need to find the mechanisms to evaluate trustworthiness with trusted computing theories. In this paper, a novel entropy-based trust modeling and evaluation methods for WSNs are carried out to give the stability and security descriptions. With the experiments, it is proved that they can be used to detect the malicious nodes, to estimate the effect and the performance of WSN.
引用
收藏
页码:27 / +
页数:3
相关论文
共 16 条
[1]  
[Anonymous], P 4 EUR S RES COMP S
[2]   A unified model of dependability: Capturing dependability in context [J].
Basili, V ;
Donzelli, P ;
Asgari, S .
IEEE SOFTWARE, 2004, 21 (06) :19-+
[3]  
BO MWZ, 2007, 8 ACIS INT C SOFTW E, V3, P104
[4]  
Chen QF, 2006, LECT NOTES COMPUT SC, V3841, P297
[5]  
GANERIWAL S, 2004, P 2 ACM WORKSH SEC A, P66
[6]   Probability updating using second order probabilities and conditional event algebra [J].
Goodman, IR ;
Nguyen, HT .
INFORMATION SCIENCES, 1999, 121 (3-4) :295-347
[7]  
Levien R, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P229
[8]  
LIU W, 2005, INDIN 2005, P104
[9]   Trust metrics, models and protocols for electronic commerce transactions [J].
Manchala, DW .
18TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 1998, :312-321
[10]   Resilient authentication using path independence [J].
Reiter, MK ;
Stubblebine, SG .
IEEE TRANSACTIONS ON COMPUTERS, 1998, 47 (12) :1351-1362