메뉴 건너뛰기




Volumn 13, Issue 7, 2014, Pages 1409-1423

A novel approach to trust management in unattended wireless sensor networks

Author keywords

distributed trust management; subjective logic; Unattended wireless sensor network (UWSN)

Indexed keywords

DATA STORAGE EQUIPMENT; POLLUTION DETECTION;

EID: 84903767555     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2013.22     Document Type: Article
Times cited : (71)

References (35)
  • 1
    • 65249138169 scopus 로고    scopus 로고
    • New adversary and new threats: Security in unattended sensor networks
    • Mar
    • D. Ma, C. Soriente, and G. Tsudik, "New adversary and new threats: Security in unattended sensor networks," IEEE Netw., vol. 23, no. 2, pp. 43-48, Mar. 2009.
    • (2009) IEEE Netw , vol.23 , Issue.2 , pp. 43-48
    • Ma, D.1    Soriente, C.2    Tsudik, G.3
  • 2
    • 84856144789 scopus 로고    scopus 로고
    • SCARKER: A sensor capture resistance and key refreshing scheme for mobile wsns
    • Bonn, Germany
    • Y. Ren, V. Oleshchuk, F. Y. Li, and S. Sulistyo, "SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs," in Proc. IEEE LCN, Bonn, Germany, 2011.
    • (2011) Proc. IEEE LCN
    • Ren, Y.1    Oleshchuk, V.2    Li, F.Y.3    Sulistyo, S.4
  • 4
    • 84878125727 scopus 로고    scopus 로고
    • United we stand: Intrusion-resilience in mobile unattended wsns
    • Jul
    • R. Di Pietro, G. Oligeri, C. Soriente, and G. Tsudik, "United we stand: Intrusion-resilience in mobile unattended WSNs," IEEE Trans. Mobile Comput., vol. 12, no. 7, pp. 1456-1468, Jul. 2013.
    • (2013) IEEE Trans. Mobile Comput , vol.12 , Issue.7 , pp. 1456-1468
    • Di Pietro, R.1    Oligeri, G.2    Soriente, C.3    Tsudik, G.4
  • 5
    • 80051887519 scopus 로고    scopus 로고
    • Epidemic data survivability in unattended wireless sensor networks
    • Hamburg, Germany
    • R. Di Pietro and N. Verde, "Epidemic data survivability in unattended wireless sensor networks," in Proc. ACM WiSec, Hamburg, Germany, 2011.
    • (2011) Proc. ACM WiSec
    • Di Pietro, R.1    Verde, N.2
  • 6
    • 36348971281 scopus 로고    scopus 로고
    • A trust-based geographical routing scheme in sensor networks
    • Kowloon, Hong Kong
    • K.-S. Hung, K.-S. Lui, and Y.-K. Kwok, "A trust-based geographical routing scheme in sensor networks," in Proc. IEEE WCNC, Kowloon, Hong Kong, 2007.
    • (2007) Proc. IEEE WCNC
    • Hung, K.-S.1    Lui, K.-S.2    Kwok, Y.-K.3
  • 7
    • 50249169438 scopus 로고    scopus 로고
    • TARP: A trust-aware routing protocol for sensor-actuator networks
    • Pisa, Italy
    • A. Rezgui and M. Eltoweissy, "TARP: A trust-aware routing protocol for sensor-actuator networks," in Proc. IEEE MASS, Pisa, Italy, 2007.
    • (2007) Proc. IEEE MASS
    • Rezgui, A.1    Eltoweissy, M.2
  • 8
    • 84877698530 scopus 로고    scopus 로고
    • Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended wsns
    • May
    • Y. Ren, V. Oleshchuk, and F. Li, "Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs," Comput. Commun., vol. 36, no. 9, pp. 1067-1077, May 2013.
    • (2013) Comput. Commun , vol.36 , Issue.9 , pp. 1067-1077
    • Ren, Y.1    Oleshchuk, V.2    Li, F.3
  • 9
    • 50249087902 scopus 로고    scopus 로고
    • Using trust in key distribution in wireless sensor networks
    • Washington, DC, USA
    • N. Lewis and N. Foukia, "Using trust in key distribution in wireless sensor networks," in Proc. GLOBECOM Workshops, Washington, DC, USA, 2007.
    • (2007) Proc. GLOBECOM Workshops
    • Lewis, N.1    Foukia, N.2
  • 10
    • 0036983290 scopus 로고    scopus 로고
    • GHT: A geographic hash table for datacentric storage
    • S. Ratnasamy et al., "GHT: A geographic hash table for datacentric storage," in Proc. ACM WSNA, 2002.
    • (2002) Proc. ACM WSNA
    • Ratnasamy, S.1
  • 11
    • 27544433189 scopus 로고    scopus 로고
    • TIBFIT: Trust index based fault tolerance for arbitrary data faults in sensor networks
    • M. Krasniewski, P. Varadharajan, B. Rabeler, S. Bagchi, and Y. Hu, "TIBFIT: Trust index based fault tolerance for arbitrary data faults in sensor networks," in Proc. DSN, 2005.
    • (2005) Proc. DSN
    • Krasniewski, M.1    Varadharajan, P.2    Rabeler, B.3    Bagchi, S.4    Hu, Y.5
  • 12
    • 44849093503 scopus 로고    scopus 로고
    • Reputation-based framework for high integrity sensor networks
    • May
    • S. Ganeriwal, L. Balzano, and M. Srivastava, "Reputation-based framework for high integrity sensor networks," ACM Trans. Sen. Netw., vol. 4, no. 3, pp. 1-37, May 2008.
    • (2008) ACM Trans. Sen. Netw , vol.4 , Issue.3 , pp. 1-37
    • Ganeriwal, S.1    Balzano, L.2    Srivastava, M.3
  • 13
    • 77954705932 scopus 로고    scopus 로고
    • ITrust: An integrated trust framework for wireless sensor networks
    • New York, NY, USA
    • K. Yadav and A. Srinivasan, "iTrust: An integrated trust framework for wireless sensor networks," in Proc. ACM SAC, New York, NY, USA, 2010.
    • (2010) Proc. ACM SAC
    • Yadav, K.1    Srinivasan, A.2
  • 14
    • 14844324732 scopus 로고    scopus 로고
    • A robust reputation system for mobile ad-hoc networks
    • S. Buchegger and J. Le Boudec, "A robust reputation system for mobile ad-hoc networks," in Proc. P2PEcon, 2004.
    • (2004) Proc. P2PEcon
    • Buchegger, S.1    Le Boudec, J.2
  • 15
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Feb
    • Y. L. Sun, W. Yu, Z. Han, and K. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 305-317, Feb. 2006.
    • (2006) IEEE J. Sel. Areas Commun , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.L.1    Yu, W.2    Han, Z.3    Liu, K.4
  • 16
    • 51349155690 scopus 로고    scopus 로고
    • On datacentric trust establishment in ephemeral ad hoc networks
    • Phoenix, AZ, USA
    • M. Raya, P. Papadimitratos, V. Gligor, and J.-P. Hubaux, "On datacentric trust establishment in ephemeral ad hoc networks," in Proc. IEEE INFOCOM, Phoenix, AZ, USA, 2008.
    • (2008) Proc. IEEE INFOCOM
    • Raya, M.1    Papadimitratos, P.2    Gligor, V.3    Hubaux, J.-P.4
  • 17
    • 63049099708 scopus 로고    scopus 로고
    • Reliable and fully distributed trust model for mobile ad hoc networks
    • May
    • M. Omar, Y. Challal, and A. Bouabdallah, "Reliable and fully distributed trust model for mobile ad hoc networks," Comput. Secur., vol. 28, no. 3-4, pp. 199-214, May 2009.
    • (2009) Comput. Secur , vol.28 , Issue.3-4 , pp. 199-214
    • Omar, M.1    Challal, Y.2    Bouabdallah, A.3
  • 18
    • 3142738238 scopus 로고    scopus 로고
    • PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities
    • Jul
    • L. Xiong and L. Liu, "PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities," IEEE Trans. Knowl. Data Eng., vol. 16, no. 7, pp. 843-857, Jul. 2004.
    • (2004) IEEE Trans. Knowl. Data Eng , vol.16 , Issue.7 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 19
    • 34047150751 scopus 로고    scopus 로고
    • PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing
    • DOI 10.1109/TPDS.2007.1021
    • R. Zhou and K. Hwang, "PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing," IEEE Trans. Parallel Distribut. Syst., vol. 18, no. 4, pp. 460-473, Apr. 2007. (Pubitemid 46523202)
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , Issue.4 , pp. 460-473
    • Zhou, R.1    Hwang, K.2
  • 20
    • 36048998112 scopus 로고    scopus 로고
    • Experience with an object reputation system for peer-to-peer filesharing
    • Berkeley, CA, USA
    • K. Walsh and E. G. Sirer, "Experience with an object reputation system for peer-to-peer filesharing," in Proc. USENIX NSDI, Berkeley, CA, USA, 2006.
    • (2006) Proc. USENIX NSDI
    • Walsh, K.1    Sirer, E.G.2
  • 21
    • 84903773119 scopus 로고    scopus 로고
    • DISH: Distributed self-healing
    • Detroit, MI, USA
    • D. Ma and G. Tsudik, "DISH: Distributed self-healing," in Proc. Int. Symp. SSS, Detroit, MI, USA, 2008.
    • (2008) Proc. Int. Symp. SSS
    • Ma, D.1    Tsudik, G.2
  • 22
    • 77949863172 scopus 로고    scopus 로고
    • Secure and efficient data storage in unattended wireless sensor networks
    • Cairo, Egypt
    • Y. Ren, V. Oleshchuk, and F. Y. Li, "Secure and efficient data storage in unattended wireless sensor networks," in Proc. IFIP Int. Conf. NTMS, Cairo, Egypt, 2009.
    • (2009) Proc. IFIP Int. Conf. NTMS
    • Ren, Y.1    Oleshchuk, V.2    Li, F.Y.3
  • 23
    • 84870736450 scopus 로고    scopus 로고
    • An efficient, robust and scalable trust management scheme for unattended wireless sensor networks," in proc
    • Bengaluru, India
    • Y. Ren, V. I. Zadorozhny, V. Oleshchuk, and F. Y. Li, "An efficient, robust and scalable trust management scheme for unattended wireless sensor networks," in Proc. IEEE MDM, Bengaluru, India, 2012.
    • (2012) IEEE MDM
    • Ren, Y.1    Zadorozhny, V.I.2    Oleshchuk, V.3    Li, F.Y.4
  • 24
    • 48049097061 scopus 로고    scopus 로고
    • Statistical trust establishment in wireless sensor networks
    • Hsinchu, Taiwan
    • M. Probst and S. Kasera, "Statistical trust establishment in wireless sensor networks," in Proc. ICPADS, Hsinchu, Taiwan, 2007.
    • (2007) Proc. ICPADS
    • Probst, M.1    Kasera, S.2
  • 26
    • 77950319889 scopus 로고    scopus 로고
    • Adaptation of reputation management systems to dynamic network conditions in ad hoc networks
    • May
    • M. T. Refaei, L. A. DaSilva, M. Eltoweissy, and T. Nadeem, "Adaptation of reputation management systems to dynamic network conditions in ad hoc networks," IEEE Trans. Comput., vol. 59, no. 5, pp. 707-719, May 2010.
    • (2010) IEEE Trans. Comput , vol.59 , Issue.5 , pp. 707-719
    • Refaei, M.T.1    Dasilva, L.A.2    Eltoweissy, M.3    Nadeem, T.4
  • 27
    • 37849013265 scopus 로고    scopus 로고
    • Tampering with motes: Real-world physical attacks on wireless sensor networks
    • York, U.K.
    • A. Becher, Z. Benenson, and M. Dornseif, "Tampering with motes: Real-world physical attacks on wireless sensor networks," in Proc. Int. Conf. SPC, York, U.K., 2006.
    • (2006) Proc. Int. Conf. SPC
    • Becher, A.1    Benenson, Z.2    Dornseif, M.3
  • 28
    • 2442519150 scopus 로고    scopus 로고
    • Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks
    • S. Tanachaiwiwat, P. Dave, R. Bhindwale, and A. Helmy, "Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks," in Proc. IEEE IPCCC, 2004.
    • (2004) Proc. IEEE IPCCC
    • Tanachaiwiwat, S.1    Dave, P.2    Bhindwale, R.3    Helmy, A.4
  • 29
    • 33144465377 scopus 로고    scopus 로고
    • On trust models and trust evaluation metrics for ad hoc networks
    • DOI 10.1109/JSAC.2005.861390
    • G. Theodorakopoulos and J. Baras, "On trust models and trust evaluation metrics for ad hoc networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 318-328, Feb. 2006. (Pubitemid 43269752)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 318-328
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 30
    • 36649033444 scopus 로고    scopus 로고
    • An algebra for assessing trust in certification chains
    • San Diego, CA, USA
    • A. Josang, "An algebra for assessing trust in certification chains," in Proc. NDSS, San Diego, CA, USA, 1999.
    • (1999) Proc. NDSS
    • Josang, A.1
  • 31
    • 84857556354 scopus 로고    scopus 로고
    • Collaborative assessment of information provider's reliability and expertise using subjective logic
    • Orlando, FL, USA
    • K. Pelechrinis, V. Zadorozhny, and V. Oleshchuk, "Collaborative assessment of information provider's reliability and expertise using subjective logic," in Proc. CollaborateCom, Orlando, FL, USA, 2011.
    • (2011) Proc. CollaborateCom
    • Pelechrinis, K.1    Zadorozhny, V.2    Oleshchuk, V.3
  • 32
    • 46449095220 scopus 로고    scopus 로고
    • Trust-aware query processing in data intensive sensor networks
    • Valencia, Spain
    • V. Oleshchuk and V. Zadorozhny, "Trust-aware query processing in data intensive sensor networks," in Proc. Int. Conf. SensorComm, Valencia, Spain, 2007.
    • (2007) Proc. Int. Conf. SensorComm
    • Oleshchuk, V.1    Zadorozhny, V.2
  • 33
    • 80053141833 scopus 로고    scopus 로고
    • A cognitivebased scheme for user reliability and expertise assessment in q&a social networks
    • Las Vegas, NV, USA
    • K. Pelechrinis, V. Zadorozhny, and V. Oleshchuk, "A cognitivebased scheme for user reliability and expertise assessment in Q&A social networks," in Proc. IEEE Conf. IRI, Las Vegas, NV, USA, 2011.
    • (2011) Proc. IEEE Conf. IRI
    • Pelechrinis, K.1    Zadorozhny, V.2    Oleshchuk, V.3
  • 34
    • 85000276942 scopus 로고    scopus 로고
    • Multilevel μtesla: Broadcast authentication for distributed sensor networks
    • Nov
    • D. Liu and P. Ning, "Multilevel μTESLA: Broadcast authentication for distributed sensor networks," ACM Trans. Embed. Comput. Syst., vol. 3, no. 4, pp. 800-836, Nov. 2004.
    • (2004) ACM Trans. Embed. Comput. Syst , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 35
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • B. Karp and H. T. Kung, "GPSR: Greedy perimeter stateless routing for wireless networks," in Proc. ACM MobiCom, 2000.
    • (2000) Proc. ACM MobiCom
    • Karp, B.1    Kung, H.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.