透過您的圖書館登入
IP:3.147.56.18
  • 學位論文

An Efficient Distributed Trust Model for Wireless sensor Networks

無線感知網路的分散式信任模式

指導教授 : 張適宇
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


在信任展示下,強烈的說明信任模式將被推薦為近年 來WSNs的最有力的安全系統。對於影響深遠的惡意攻 擊評估來說,大多數只考慮通信行為的計算傳感器集 線器的研究工作是不夠的。在本篇論文中,將說明無 線傳感器網絡的高效的分佈式信任模型(EDTM)。首 先,通過傳感器集成了包的數量指示,直接計算信任 和意見信賴。在這一點上,對應的信賴評估為充滿活 力的信賴和信任的信息的直接信任。此外,信任可靠 性和自然的特點,將能提高建議信任的正確性。 EDTM 可以更加正確的評估傳感器的可靠性,並且使得 安全模式更加成功

關鍵字

無線 傳感器 網路

並列摘要


Trust models have been as of late recommended as a powerful security system for Wireless Sensor Networks (WSNs). Significant exploration has been done on demonstrating trust. In any case, most ebb and flow research work just considers correspondence conduct to compute sensor hubs' trust esteem, which is insufficient for trust assessment because of the far-reaching malignant assaults. In my thesis, I propose an Efficient Distributed Trust Model (EDTM) for WSNs. To begin with, as indicated by the quantity of bundles got by sensor hubs, direct trust and suggestion trust are specifically computed. At that point, correspondence trust, vitality trust and information trust are considered amid the estimation of direct trust. Besides, trust dependability and nature are characterized to enhance the exactness of suggestion trust. The proposed EDTM can assess reliability of sensor hubs all the more correctly and keep the security breaks all the more successfully.

並列關鍵字

wireless sensor network

參考文獻


[1] G. Han, J. Jiang, L. Shu, J. Niu and H.C. Chao, “Managements and applications of trust in Wireless Sensor Networks: A Survey”. Journal of Computer and System Sciences, pp. 1-16, 2013.
[2] T. Zahariadis, P. Trakadas, H. Leligou, P. Karkazis, and S. V oliotis, “Implementing a Trust-Aware Routing Protocol in Wireless Sensor Nodes,” Developments in E-systems Engineering, 2010, pp. 47-52.
[3] V., G. and Chandrasekaran, K. (2014) A Distributed Trust Based Secure Communication Framework for Wireless Sensor Network. Wireless Sensor Network.
[6] H. Safa, H. Artail, and D. Tabet, “A cluster- based trust-aware routing protocol for mobile ad hoc networks,”Wirel. Netw., vol. 16, no. 4, pp. 969–984, 2010.
[8] W. Gong, Z. You, D. Chen, X. Zhao, M. Gu, and K. Lam, “Trust based routing for misbehavior detection in ad hoc networks,” Journal of Networks, vol. 5, no. 5, May 2010.

延伸閱讀