메뉴 건너뛰기




Volumn 26, Issue 5, 2015, Pages 1228-1237

An Efficient Distributed Trust Model for Wireless Sensor Networks

Author keywords

distributed trust model; energy efficient; Wireless sensors networks

Indexed keywords

ENERGY EFFICIENCY; MOBILE SECURITY; NETWORK SECURITY; SECURITY OF DATA; SENSOR NODES;

EID: 84927602818     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2014.2320505     Document Type: Article
Times cited : (274)

References (18)
  • 1
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • Oct.
    • H. Chan and A Perrig, "Security and privacy in sensor networks," Comput., vol. 36, no. 10, pp. 103-105, Oct. 2003.
    • (2003) Comput. , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 2
    • 67349219359 scopus 로고    scopus 로고
    • Pervasive, secure access to a hierarchical-based health-care monitoring architecture in wireless heterogeneous sensor networks
    • May
    • Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung, and J. H. Park, "Pervasive, secure access to a hierarchical-based health-care monitoring architecture in wireless heterogeneous sensor networks," IEEE J. Sel. Areas Commun., vol. 24, no. 7, pp. 400-411, May 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.24 , Issue.7 , pp. 400-411
    • Huang, Y.M.1    Hsieh, M.Y.2    Chao, H.C.3    Hung, S.H.4    Park, J.H.5
  • 3
    • 77956607253 scopus 로고    scopus 로고
    • Opportunities and challenges of wireless sensor networks in smart grid
    • Oct.
    • V. C. Gungor, L. Bin, and G. P. Hancke, "Opportunities and challenges of wireless sensor networks in smart grid," IEEE Trans. Ind. Electron., vol. 57, no. 10, pp. 3557-3564, Oct. 2010.
    • (2010) IEEE Trans. Ind. Electron. , vol.57 , Issue.10 , pp. 3557-3564
    • Gungor, V.C.1    Bin, L.2    Hancke, G.P.3
  • 4
    • 84891933258 scopus 로고    scopus 로고
    • Managements and applications of trust in wireless sensor networks: A Survey
    • G. Han, J. Jiang, L. Shu, J. Niu, and H. C. Chao, "Managements and applications of trust in wireless sensor networks: A Survey," J. Comput. Syst. Sci., vol. 80, no. 3, pp. 602-617, 2014.
    • (2014) J. Comput. Syst. Sci. , vol.80 , Issue.3 , pp. 602-617
    • Han, G.1    Jiang, J.2    Shu, L.3    Niu, J.4    Chao, H.C.5
  • 6
    • 39049103908 scopus 로고    scopus 로고
    • PLUS: Parameterized and localized trust management scheme for sensor networks security
    • Z. Yao, D. Kim, and Y. Doh, "PLUS: Parameterized and localized trust management scheme for sensor networks security," in Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst., 2008, pp. 437-446.
    • Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst., 2008 , pp. 437-446
    • Yao, Z.1    Kim, D.2    Doh, Y.3
  • 7
    • 79952097418 scopus 로고    scopus 로고
    • A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory
    • R. Feng, X. Xu, X. Zhou, and J. Wan, "A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory," Sensors, vol. 11, pp. 1345-1360, 2011.
    • (2011) Sensors , vol.11 , pp. 1345-1360
    • Feng, R.1    Xu, X.2    Zhou, X.3    Wan, J.4
  • 8
    • 84947615454 scopus 로고    scopus 로고
    • Cross-layer optimized routing in WSN with duty-cycle and energy harvesting
    • 3 Feb.
    • G. Han, Y. Dong, H. Guo, L. Shu, and D. Wu, "Cross-layer optimized routing in WSN with duty-cycle and energy harvesting," Wireless Commun. Mobile Comput., 3 Feb. 2014, DOI: 10.1002/wcm.2468.
    • (2014) Wireless Commun. Mobile Comput.
    • Han, G.1    Dong, Y.2    Guo, H.3    Shu, L.4    Wu, D.5
  • 9
    • 84870706790 scopus 로고    scopus 로고
    • The insights of localization through mobile anchor nodes in wireless sensor networks with irregular radio
    • G. Han, X. Xu, J. Jiang, L. Shu, and N. Chilamkurti, "The insights of localization through mobile anchor nodes in wireless sensor networks with irregular radio," KSII Trans. Internet Inf. Syst., vol. 6, pp. 2992-3007, 2012.
    • (2012) KSII Trans. Internet Inf. Syst. , vol.6 , pp. 2992-3007
    • Han, G.1    Xu, X.2    Jiang, J.3    Shu, L.4    Chilamkurti, N.5
  • 10
    • 84861334371 scopus 로고    scopus 로고
    • Trust computations and trust dynamics in mobile ad hoc networks: A survey
    • 2nd Quarter
    • K. Govindan and P. Mohapatra, "Trust computations and trust dynamics in mobile ad hoc networks: A survey," IEEE Commun. Surveys Tuts., vol. 14, no. 2, pp. 279-298, 2nd Quarter 2012.
    • (2012) IEEE Commun. Surveys Tuts. , vol.14 , Issue.2 , pp. 279-298
    • Govindan, K.1    Mohapatra, P.2
  • 11
    • 84874285180 scopus 로고    scopus 로고
    • Trustworthiness in networks: A simulation approach for approximating local trust and distrust values
    • K. Nordheimer, T. Schulze, and D. Veit, "Trustworthiness in networks: A simulation approach for approximating local trust and distrust values," IEEE Commun. Surveys Tuts., vol. 321, pp. 157-171, 2010.
    • (2010) IEEE Commun. Surveys Tuts. , vol.321 , pp. 157-171
    • Nordheimer, K.1    Schulze, T.2    Veit, D.3
  • 14
    • 84927611662 scopus 로고    scopus 로고
    • Ray projection method and its applications based on Grey Prediction
    • M. Chen, Y. Zhou, and L, Tang, "Ray projection method and its applications based on Grey Prediction," Chinese J. Statist. Decision, vol. 1, p. 13, 2007.
    • (2007) Chinese J. Statist. Decision , vol.1 , pp. 13
    • Chen, M.1    Zhou, Y.2    Tang, L.3
  • 18
    • 84871870154 scopus 로고    scopus 로고
    • Normal distribution based dynamical recommendation trust model
    • K. Shao, F. Luo, N. Mei, and Z. Liu, "Normal distribution based dynamical recommendation trust model," J. Softw., vol. 23, no. 12, pp. 3130-3148, 2012.
    • (2012) J. Softw. , vol.23 , Issue.12 , pp. 3130-3148
    • Shao, K.1    Luo, F.2    Mei, N.3    Liu, Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.