A Comprehensive Overview on Application of Trust and Reputation in Wireless Sensor Network

被引:12
作者
Kumar, G. Edwin Prem [1 ]
Titus, I [1 ]
Thekkekara, Sony I. [1 ]
机构
[1] Karunya Univ, IT Dept, Coimbatore 641114, Tamil Nadu, India
来源
INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING | 2012年 / 38卷
关键词
Trust; Reputation; Attacks; Subjective Logic Trust Model; Game Theory Trust model; Fuzzy Trust model; bayesian trust model; AD-HOC; MODEL; SECURITY;
D O I
10.1016/j.proeng.2012.06.339
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Trust is being deployed along side with cryptography in WSN to achieve better security. This paper describes about how the various systems that are designed to act against attacks with various resource constraints. The design of the security tools for the WSN has to take its vulnerabilities and nature of the technology into consideration thus making them special. In this survey paper, a detailed study about the various methods that apply trust and reputation as their security measure and the attacks that they face are given. (c) 2012 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Noorul Islam Centre for Higher Education
引用
收藏
页码:2903 / 2912
页数:10
相关论文
共 52 条
[1]  
Agah A, 2004, IEEE IPCCC, P259
[2]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[3]   RSDA: Reputation-based Secure Data Aggregation in Wireless Sensor Networks [J].
Alzaid, Hani ;
Foo, Ernest ;
Nieto, Juan Gonzalez .
PDCAT 2008: NINTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2008, :419-424
[4]  
[Anonymous], COMP SYST APPL AICCS
[5]  
[Anonymous], WIRELESS SENSOR NETW
[6]  
[Anonymous], J NETWORK C IN PRESS
[7]  
[Anonymous], P 10 ACM C COMP COMM
[8]  
[Anonymous], SYSTEMICS CYBERNETIC
[9]  
[Anonymous], P 6 AUSTR C INF SEC
[10]  
[Anonymous], COMPUTER COMMUNICATI