메뉴 건너뛰기




Volumn 16, Issue 6, 2012, Pages 1164-1175

A distributed trust evaluation model and its application scenarios for medical sensor networks

Author keywords

Medical sensor networks (MSNs); network performance; privacy; security; trust evaluation

Indexed keywords

APPLICATION SCENARIO; CRYPTOGRAPHIC TECHNIQUES; DISTRIBUTED NODES; E-HEALTHCARE; MALICIOUS BEHAVIOR; MALICIOUS NODES; MEDICAL SENSOR NETWORKS; NODE MISBEHAVIOR; SECURITY; SECURITY AND PERFORMANCE; TRANSMISSION RATES; TRUST EVALUATION; TRUST MANAGEMENT; UNIQUE FEATURES;

EID: 84870885560     PISSN: 10897771     EISSN: None     Source Type: Journal    
DOI: 10.1109/TITB.2012.2199996     Document Type: Article
Times cited : (93)

References (26)
  • 2
    • 35549002780 scopus 로고    scopus 로고
    • Addressing security in medical sensor networks
    • K. Malasri and L. Wang, "Addressing security in medical sensor networks," in Proc. HealthNet, 2007, pp. 7-12.
    • (2007) Proc. HealthNet , pp. 7-12
    • Malasri, K.1    Wang, L.2
  • 4
    • 70449562519 scopus 로고    scopus 로고
    • IBE-Lite: A lightweight identity-based cryptography for body sensor networks
    • Nov
    • C. C. Tan, H. Wang, S. Zhong, and Q. Li, "IBE-Lite: A lightweight identity-based cryptography for body sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 6, pp. 926-932, Nov. 2009.
    • (2009) IEEE Trans. Inf. Technol. Biomed. , vol.13 , Issue.6 , pp. 926-932
    • Tan, C.C.1    Wang, H.2    Zhong, S.3    Li, Q.4
  • 5
    • 80855130876 scopus 로고    scopus 로고
    • Distributed access control with privacy support in wireless sensor networks
    • Oct
    • D. He, J. Bu, S. Zhu, S. Chan, and C. Chen, "Distributed access control with privacy support in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3472-3481, Oct. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.10 , pp. 3472-3481
    • He, D.1    Bu, J.2    Zhu, S.3    Chan, S.4    Chen, C.5
  • 7
    • 0009481412 scopus 로고    scopus 로고
    • A survey of trust in Internet applications
    • Fourth Quarter
    • T. Grandison and M. Sloman, "A survey of trust in Internet applications," IEEE Commun. Surv. Tutorials, vol. 3, no. 4, pp. 2-16, Fourth Quarter 2000.
    • (2000) IEEE Commun. Surv. Tutorials , vol.3 , Issue.4 , pp. 2-16
    • Grandison, T.1    Sloman, M.2
  • 9
    • 67349129674 scopus 로고    scopus 로고
    • A secure mobile healthcare system using trust-based multicast scheme
    • May
    • A. Boukerche and Y. Ren, "A secure mobile healthcare system using trust-based multicast scheme," IEEE J. Sel. Areas Commun., vol. 27, no. 4, pp. 387-399, May 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.4 , pp. 387-399
    • Boukerche, A.1    Ren, Y.2
  • 10
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. Mobicom 2000, pp., 255-265.
    • (2000) Proc. Mobicom , pp. 255-265
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 11
    • 33845715578 scopus 로고    scopus 로고
    • Location verification and trust management for resilient geographic routing
    • K. Liu, N. Ghazaleh, and K. Kang, "Location verification and trust management for resilient geographic routing," J. Parallel Distrib. Comput., vol. 67, no. 2, pp. 215-228, 2007.
    • (2007) J. Parallel Distrib. Comput. , vol.67 , Issue.2 , pp. 215-228
    • Liu, K.1    Ghazaleh, N.2    Kang, K.3
  • 13
    • 77951542715 scopus 로고    scopus 로고
    • A trust management scheme for enhancing security in pervasive wireless networks
    • M. K. Denko, T. Sun, I. Woungang, J. Rodrigues, and H.-C. Chao, "A trust management scheme for enhancing security in pervasive wireless networks," in Proc. GLOBECOM, 2009, pp. 1-6.
    • (2009) Proc. GLOBECOM , pp. 1-6
    • Denko, M.K.1    Sun, T.2    Woungang, I.3    Rodrigues, J.4    Chao, H.-C.5
  • 14
    • 44049090146 scopus 로고    scopus 로고
    • A trust evaluation method for node cooperation in mobile ad hoc networks
    • K. Wang, M. Wu, and S. Shen, "A trust evaluation method for node cooperation in mobile ad hoc networks," in Proc. 5th Int. Conf. Inf. Technol: New Gen., 2008, pp. 1000-1005.
    • (2008) Proc. 5th Int. Conf. Inf. Technol: New Gen , pp. 1000-1005
    • Wang, K.1    Wu, M.2    Shen, S.3
  • 15
    • 27944459744 scopus 로고    scopus 로고
    • Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    • D. Liu, P. Ning, and W. Du, "Detecting malicious beacon nodes for secure location discovery in wireless sensor networks," in Proc. IEEE Int. Conf. Distrib. Comput. Syst., 2005, pp. 609-619.
    • (2005) Proc. IEEE Int. Conf. Distrib. Comput. Syst , pp. 609-619
    • Liu, D.1    Ning, P.2    Du, W.3
  • 19
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Trans. Sens. Netw., vol. 2, no. 4, pp. 500-528, 2006.
    • (2006) ACM Trans. Sens. Netw. , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 20
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decis. Supp. Syst., vol. 43, no. 2, pp. 618-644, 2005.
    • (2005) Decis. Supp. Syst. , vol.43 , Issue.2 , pp. 618-644
    • Josang, A.1    Ismail, R.2    Boyd, C.3
  • 22
    • 84870901428 scopus 로고    scopus 로고
    • Using wearable sensors for remote healthcare monitoring system
    • A. Abidoye, N. Azeez, A. Adesina, K. Agbele, and H. Nyongesa, "Using wearable sensors for remote healthcare monitoring system," J. Sens. Technol., vol. 1, no. 2, pp. 22-28, 2011.
    • (2011) J. Sens. Technol. , vol.1 , Issue.2 , pp. 22-28
    • Abidoye, A.1    Azeez, N.2    Adesina, A.3    Agbele, K.4    Nyongesa, H.5
  • 24
    • 79957583041 scopus 로고    scopus 로고
    • Multimedia traffic security architecture for the internet of things
    • May/Jun
    • L. Zhou and H.-C. Chao, "Multimedia traffic security architecture for the internet of things," IEEE Netw. Mag., vol. 25, no. 3, pp. 35-40, May/Jun. 2011.
    • (2011) IEEE Netw. Mag. , vol.25 , Issue.3 , pp. 35-40
    • Zhou, L.1    Chao, H.-C.2
  • 25
    • 41549167232 scopus 로고    scopus 로고
    • A framework for identifying compromised nodes in wireless sensor networks
    • Q. Zhang, T. Yu, and P. Ning, "A framework for identifying compromised nodes in wireless sensor networks," ACM Trans. Inf. Syst. Security, vol. 11, no. 3, pp. 1-37, 2008.
    • (2008) ACM Trans. Inf. Syst. Security , vol.11 , Issue.3 , pp. 1-37
    • Zhang, Q.1    Yu, T.2    Ning, P.3
  • 26
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May/Jun
    • Y.-C. Hu and A. Perrig, "A survey of secure wireless ad hoc routing," IEEE Security Privacy, vol. 2, no. 3, pp. 28-39, May/Jun. 2004.
    • (2004) IEEE Security Privacy , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.-C.1    Perrig, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.