메뉴 건너뛰기




Volumn , Issue , 2009, Pages 355-362

Trustworthiness assessment of wireless sensor data for business applications

Author keywords

Subjective logic; Trust assessment; WSN

Indexed keywords

BUSINESS APPLICATIONS; BUSINESS PROCESS; DEFECTIVE SENSORS; SENSOR DATA; SUBJECTIVE LOGIC; TRUST ASSESSMENT; TRUST MODELS; WIRELESS SENSOR DATA; WSN;

EID: 70349484952     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2009.92     Document Type: Conference Paper
Times cited : (30)

References (19)
  • 2
    • 2942686425 scopus 로고    scopus 로고
    • Sensor networks: Evolution, opportunities, and challenges
    • August
    • C. Chong and S. Kumar. Sensor networks: evolution, opportunities, and challenges. in the Proceedings of the IEEE, 91(8):1247-1256, August 2003.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.8 , pp. 1247-1256
    • Chong, C.1    Kumar, S.2
  • 3
    • 70349494814 scopus 로고    scopus 로고
    • M. Covington, M. Ahamd, I. Essa1, and H. Venkateswaran. Parametrized authentication. in ESORICS, 2004.
    • M. Covington, M. Ahamd, I. Essa1, and H. Venkateswaran. Parametrized authentication. in ESORICS, 2004.
  • 4
    • 14844315770 scopus 로고    scopus 로고
    • Reputation-based framework for high integrity sensor networks
    • S. Ganeriwal and M. Srivastava. Reputation-based framework for high integrity sensor networks. in ACM ESAS Workshop, pages 66-77, 2004.
    • (2004) ACM ESAS Workshop , pp. 66-77
    • Ganeriwal, S.1    Srivastava, M.2
  • 7
    • 70349500984 scopus 로고    scopus 로고
    • Fault-tolerant clustering of wireless sensor networks
    • G. Gupta and M. Younis. Fault-tolerant clustering of wireless sensor networks. in IEEE INFOCOM, 2005.
    • (2005) IEEE INFOCOM
    • Gupta, G.1    Younis, M.2
  • 11
    • 33646722331 scopus 로고    scopus 로고
    • Semantic constraints for trust transitivity
    • A. Josang and S. Pope. Semantic constraints for trust transitivity. in the Proceedings of APCCM, 2005.
    • (2005) Proceedings of APCCM
    • Josang, A.1    Pope, S.2
  • 12
    • 37149012633 scopus 로고    scopus 로고
    • On data-centric trust establishment in ephemeral ad hoc networks
    • Technical Report
    • V. D. G. M. Raya, P. Papadimitratos and J.-P. Hubaux. On data-centric trust establishment in ephemeral ad hoc networks. Technical Report., 2007.
    • (2007)
    • Raya, V.D.G.M.1    Papadimitratos, P.2    Hubaux, J.-P.3
  • 13
    • 70349494813 scopus 로고    scopus 로고
    • V. D. G. M. Raya, P. Papadimitratos and J.-P. Hubaux. Subjective logic based trust model for mobile ad-hoc networks. In the proceedings of the 4th International Conference on Security and Privacy in Communications Networks, 2008.
    • V. D. G. M. Raya, P. Papadimitratos and J.-P. Hubaux. Subjective logic based trust model for mobile ad-hoc networks. In the proceedings of the 4th International Conference on Security and Privacy in Communications Networks, 2008.
  • 14
    • 3042598885 scopus 로고    scopus 로고
    • Trust andclustering-based authentication services in mobile ad hoc networks
    • E. H. Ngai and M. Lyu. Trust andclustering-based authentication services in mobile ad hoc networks. in the Proceedings of ICDCS Workshops, pages 582-587, 2004.
    • (2004) Proceedings of ICDCS Workshops , pp. 582-587
    • Ngai, E.H.1    Lyu, M.2
  • 16
    • 70349505331 scopus 로고    scopus 로고
    • WASP Consortium, Accessible Sensor Population. FP IP Project IST 034963
    • WASP Consortium. Wirelessly Accessible Sensor Population. FP IP Project IST 034963. www.waspproject. com.
    • Wirelessly
  • 17
    • 67349127851 scopus 로고    scopus 로고
    • Alert confidence fusion in intrusion detection systems with extended dempster-shafer theory
    • D. Yu and D. Frincke. Alert confidence fusion in intrusion detection systems with extended dempster-shafer theory. in the Proceedings of the Southeast Regional Conference, 43:142-147, 2005.
    • (2005) Proceedings of the Southeast Regional Conference , vol.43 , pp. 142-147
    • Yu, D.1    Frincke, D.2
  • 18
    • 41549101251 scopus 로고    scopus 로고
    • A framework for identifying compromised nodes in sensor networks
    • August
    • Q. Zhang, T. Yu, and P. Ning. A framework for identifying compromised nodes in sensor networks. in Proceedings of the IEEE SecureComm, August 2006.
    • (2006) Proceedings of the IEEE SecureComm
    • Zhang, Q.1    Yu, T.2    Ning, P.3
  • 19
    • 43849098907 scopus 로고    scopus 로고
    • A trust based framework for secure data aggregation on wireless sensor networks
    • September
    • W. Zhang, S. Das, and Y. Liu. A trust based framework for secure data aggregation on wireless sensor networks. in the Proceedings of the IEEE SECON, September 2006.
    • (2006) Proceedings of the IEEE SECON
    • Zhang, W.1    Das, S.2    Liu, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.