Research on Trust Model of Sensor Nodes in WSNs

被引:20
作者
Gu Xiang [1 ]
Qiu Jianlin [1 ]
Wang Jin [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Nanjing 210003, Peoples R China
来源
2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING | 2012年 / 29卷
关键词
Wireless Sensor Networks; Trust Evaluation; Malicious Evaluation; Security Routing Protocol;
D O I
10.1016/j.proeng.2012.01.063
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
A trust model of sensor nodes in WSNs that named AEMP is proposed. AEMP means 'Addition Encouragement, Multiplication Punishment'. Compared with current other models, AEMP works with simple calculation and needs fewer resources. The paper also discusses different values' influence of parameters to evaluation performance. Then the model integrated direct and indirect trust value is discussed. This integration model can identify a bad node more quickly, but it may also conduct the problem of malicious evaluation. For each kind of model, a lot of simulation experiments are done to test its performance. AEMP models can enhance WSN ability to against attacks from inside-network. And they also afford new routing algorithm while designing a WSNs routing protocol. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Harbin University of Science and Technology
引用
收藏
页码:909 / 913
页数:5
相关论文
共 8 条
[1]  
[Anonymous], 2004, INPROCEEDINGS ACM
[2]  
Chen Chang-ming, 2010, COMPUTER TECHNOLOGY, V20, P131
[3]  
[肖德琴 XIAO DeQin], 2007, [计算机科学, Computer Science], V34, P84
[4]  
Xing Mingyan, 2009, Journal of Wuhan University of Technology (Information & Management Engineering), V31, P896, DOI 10.3963/j.issn.1007-144X.2009.06.011
[5]  
Yang Bo, 2007, COMPUTER SCI, V3496, P100
[6]  
Yang Guang, 2009, Journal on Communications, V30, P18
[7]   Reputation methods for routing security for mobile ad hoc networks [J].
Yau, PW ;
Mitchell, CJ .
SYMPOTIC'03: JOINT IST WORKSHOP ON MOBILE FUTURE & SYMPOSIUM ON TRENDS IN COMMUNICATIONS, PROCEEDINGS, 2003, :130-137
[8]  
Zhang Xian-yi, 2010, COMPUTER APPL SOFTWA, V27, P114