메뉴 건너뛰기




Volumn 11, Issue 2, 2011, Pages 1345-1360

A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory

Author keywords

Evidence theory; Network security; Node behaviors; Trust evaluation; Wireless sensor networks

Indexed keywords

ALGORITHM; ARTICLE; COMPUTER NETWORK; COMPUTER SIMULATION; INSTRUMENTATION; THEORETICAL MODEL; WIRELESS COMMUNICATION;

EID: 79952097418     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s110201345     Document Type: Article
Times cited : (183)

References (26)
  • 1
    • 48549088586 scopus 로고    scopus 로고
    • Trust Management in Wireless Sensor Networks
    • Jing, Q.; Tang, L.Y.; Chen, Z. Trust Management in Wireless Sensor Networks. J. Softw. 2008, 19, 1716-1730.
    • (2008) J. Softw. , vol.19 , pp. 1716-1730
    • Jing, Q.1    Tang, L.Y.2    Chen, Z.3
  • 5
    • 30544438141 scopus 로고    scopus 로고
    • Beyond Proof-of-Compliance: Security Analysis in Trust Management
    • Li, N.H.; Mitchell, J.C.; Winsborough, W.H. Beyond Proof-of-Compliance: Security Analysis in Trust Management. J. ACM 2005, 52, 474-514.
    • (2005) J. ACM , vol.52 , pp. 474-514
    • Li, N.H.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 6
    • 26844545857 scopus 로고    scopus 로고
    • Towards an Ontology of Trust
    • In, Copenhagen, Denmark, 22-26 August
    • Viljanen, L. Towards an Ontology of Trust. In Proceedings of the TrustBus 2005, LNCS 3592, Copenhagen, Denmark, 22-26 August 2005; pp. 175-184.
    • (2005) Proceedings of the TrustBus 2005, LNCS 3592 , pp. 175-184
    • Viljanen, L.1
  • 9
    • 27744464611 scopus 로고    scopus 로고
    • Research on a Fuzzy Logic-Based Subjective Trust Management Model
    • Tang, W.; Hu, J.B.; Chen, Z. Research on a Fuzzy Logic-Based Subjective Trust Management Model. J. Comput. Res. Develop. 2005, 42, 1654-1659.
    • (2005) J. Comput. Res. Develop. , vol.42 , pp. 1654-1659
    • Tang, W.1    Hu, J.B.2    Chen, Z.3
  • 12
    • 18844362199 scopus 로고    scopus 로고
    • Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-aware Sensor Networks
    • In, Los Angeles, CA, USA, November
    • Tanachaiwiwat, S.; Dave, P.; Bhindwale, R.; Helmy, A. Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-aware Sensor Networks. In Proceedings of the SenSys, Los Angeles, CA, USA, November 2003; pp. 324-325.
    • (2003) Proceedings of the SenSys , pp. 324-325
    • Tanachaiwiwat, S.1    Dave, P.2    Bhindwale, R.3    Helmy, A.4
  • 19
    • 34548020232 scopus 로고    scopus 로고
    • Adaptive Security Design with Malicious Node Detection in Cluster-Based Sensor Networks
    • Hsieh, M.Y.; Huang, Y.M.; Chao, H.C. Adaptive Security Design with Malicious Node Detection in Cluster-Based Sensor Networks. Comput. Commun. 2007, 30, 2385-2400.
    • (2007) Comput. Commun. , vol.30 , pp. 2385-2400
    • Hsieh, M.Y.1    Huang, Y.M.2    Chao, H.C.3
  • 20
    • 77950627981 scopus 로고    scopus 로고
    • Towards Pre-standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems
    • Marmol, F.G.; Perez, G.M. Towards Pre-standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems. Comput. Stand. Interfaces 2010, 32, 185-196.
    • (2010) Comput. Stand. Interfaces , vol.32 , pp. 185-196
    • Marmol, F.G.1    Perez, G.M.2
  • 21
    • 77950866308 scopus 로고    scopus 로고
    • Trust Management Systems for Wireless Sensor Networks: Best Practices
    • Lopez, J.; Roman, R.; Agudo, I.; Fernandez, C.G. Trust Management Systems for Wireless Sensor Networks: Best Practices. Comput. Commun. 2010, 33, 1086-1093.
    • (2010) Comput. Commun. , vol.33 , pp. 1086-1093
    • Lopez, J.1    Roman, R.2    Agudo, I.3    Fernandez, C.G.4
  • 23
    • 71949099223 scopus 로고    scopus 로고
    • A New Trust Management Model for P2P Networks with Time Self-Decay and Subjective Expect
    • Li, J.L.; Gu, L.Z.; Yang, Y.X. A New Trust Management Model for P2P Networks with Time Self-Decay and Subjective Expect. J. Electron. Inf. Technol. 2009, 31, 2786-2790.
    • (2009) J. Electron. Inf. Technol. , vol.31 , pp. 2786-2790
    • Li, J.L.1    Gu, L.Z.2    Yang, Y.X.3
  • 24
    • 70349257589 scopus 로고    scopus 로고
    • Behavior-Driven Role-Based Trust Management
    • Li, L.; Fan, L.; Hui, H. Behavior-Driven Role-Based Trust Management. J. Softw. 2009, 20, 2298-2306.
    • (2009) J. Softw. , vol.20 , pp. 2298-2306
    • Li, L.1    Fan, L.2    Hui, H.3
  • 25
    • 0000516376 scopus 로고
    • Upper and Lower Probabilities Induced by Multivalued Mapping
    • Dempster, A. Upper and Lower Probabilities Induced by Multivalued Mapping. Ann. Math. Stat. 1967, 38, 325-339.
    • (1967) Ann. Math. Stat. , vol.38 , pp. 325-339
    • Dempster, A.1
  • 26
    • 62549090256 scopus 로고    scopus 로고
    • A Pipeline Leakage Diagnosis for Fusing Neural Network and Evidence Theory
    • Chen, B.; Wan, J.W.; Wu, Y.F. A Pipeline Leakage Diagnosis for Fusing Neural Network and Evidence Theory. J. Beijing Univ. Posts Telecommun. 2009, 32, 5-9.
    • (2009) J. Beijing Univ. Posts Telecommun. , vol.32 , pp. 5-9
    • Chen, B.1    Wan, J.W.2    Wu, Y.F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.