期刊文献+

无线传感器网络节点信任模型研究 被引量:3

Exploration on Node Trust Model of Wireless Sensor Networks
下载PDF
导出
摘要 无线传感器网络由于其无线性质、通信和计算的局限而易受到安全威胁,传统的安全机制不适用于无线传感器网络。信任模型是无线传感器网络中的一种有效安全机制。目前,不少学者已经研究及总结大量的信任模型,但近年来对节点信任模型的研究较为匮乏。调研近年面向无线传感器网络的节点信任模型,旨在了解当前节点信任模型的研究趋势和设计思路。具体地,介绍近年较经典的节点信任模型,对比、总结当前节点信任模型的不足,并讨论无线传感器节点信任模型的未来趋势。 Due to the wireless feature and limited communication and computing capabilities,wireless sensor networks are vulnerable to security threats,and traditional security mechanisms are not applicable.The trust model is an effective security mechanism in wireless sensor networks.At present,many scholars have explored and summarized large quantities of trust models,and howeverin recent years,less researchis done on node trust models.The recent node trust model for wireless sensor networks is investigated,so as to understand the research trends and design ideas of the current node trust model.Specifically,the current relatively classic node trust modelsare introduced,thecomparison and summary on insufficiency of the node trust models also done.Finally,the future trends of wireless sensor node trust models are discussed.
作者 冯双 FENG Shuang(Department of Information and Communication,Xinyang Public Security Bureau,Xinyang Henan 464000,China)
出处 《通信技术》 2019年第2期434-438,共5页 Communications Technology
关键词 信任模型 安全机制 无线传感器网络 内部攻击 trust model security mechanism wireless sensor network internal attack
  • 相关文献

参考文献1

二级参考文献12

  • 1Prathap U, Shenoy D P, Venugopal K R, et al. Wireless Sensor Networks Applications and Routing Protocols:Survey and Research Challenges [ C ]//Proceedings of the Cloud and Services Computing (ISCOS) ,2012 International Symposium on. IEEE,2012:49-56.
  • 2Shashikala,Kavitha, C. A Survey on Secured Routing Protocols for Wireless Sensor Network [ C ]//Proceedings of Computing Commu- nication and Networking Technologies ( ICCCNT ) , 2012 Third In- ternational Conference on. IEEE ,2012 : 1-8.
  • 3Momani M. Trust Models in Wireless Sensor Networks: a Survey [ M ]//Recent Trends in Network Security and Applications.Springer Berlin Heidelberg,2010 : 37-46.
  • 4Ganeriwal S, Srivastava M B. Reputation-Based Framework for High Integrity Sensor Networks [ C ]//Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks ( SASN '04) , Washington, D C, USA : ACM, 2004: 66- 77.
  • 5Yu H, Shen Z, Miao C, et al. A Survey of Trust and Reputation Man- agement Systems in Wireless Communications [ J ]. Proceedings of the IEEE,2010,98(10) :1755-1772.
  • 6Duan J, Gao D, Yang D, et al. An Energy-Aware Trust Derivation Scheme with Game Theoretic Approach in Wireless Sensor Networks for lot Applications [ J ]. IEEE Internet of Things Jourual,2014,1(1) :58-69.
  • 7Li X, Zhou F, Du J. LDTS:A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks[J]. IEEE Transac- tions on Information Forensics and Security, 2013,8 (6) : 924- 935.
  • 8Sinha R K, Jagannatham A K, Gaussian Trust and Reputation for Fading MIMO Wireless Sensor Networks [ C ]//Proceedings of E- lectronics, Computing and Communication Technologies ( IEEE CONECCT), 2014 IEEE International Conference on. IEEE, 2014,1-6.
  • 9Gheorghe L, Rughinis R, Tataroiu R. Adaptive Trust Management Protocol Based on Intrusion Detection for Wireless Sensor Networks [ C ]//Proceedings of the Networking in Education and Research, 2013 RoEduNet International Conference 12th Edition. IEEE, 2013 : 1-7.
  • 10荆琦,唐礼勇,陈钟.无线传感器网络中的信任管理[J].软件学报,2008,19(7):1716-1730. 被引量:62

共引文献9

同被引文献20

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部