메뉴 건너뛰기




Volumn 26, Issue 2, 2015, Pages 107-130

Trust management system in wireless sensor networks: Design considerations and research challenges

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 84928666537     PISSN: 21615748     EISSN: 21613915     Source Type: Journal    
DOI: 10.1002/ett.2674     Document Type: Article
Times cited : (61)

References (70)
  • 2
    • 2942686425 scopus 로고    scopus 로고
    • Sensor networks: Evolution, opportunities, and challenges
    • Chee YC, Kumar SP,. Sensor networks: evolution, opportunities, and challenges. Proceedings of the IEEE 2003; 91: 1247-1256.
    • (2003) Proceedings of the IEEE , vol.91 , pp. 1247-1256
    • Chee, Y.C.1    Kumar, S.P.2
  • 6
    • 70349308780 scopus 로고    scopus 로고
    • Analysis of security threats, requirements, technologies and standards in wireless sensor networks
    • Lopez J, Roman R, Alcaraz C,. Analysis of security threats, requirements, technologies and standards in wireless sensor networks. LNCS 2009; 5705: 289-338.
    • (2009) LNCS , vol.5705 , pp. 289-338
    • Lopez, J.1    Roman, R.2    Alcaraz, C.3
  • 7
    • 84858038684 scopus 로고    scopus 로고
    • Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    • Yanli Y, Keqiu L, Wanlei Z, Ping L,. Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. Journal of Network and Computer Application 2011; 35 (3): 867-880.
    • (2011) Journal of Network and Computer Application , vol.35 , Issue.3 , pp. 867-880
    • Yanli, Y.1    Keqiu, L.2    Wanlei, Z.3    Ping, L.4
  • 9
    • 77956948315 scopus 로고    scopus 로고
    • Survey of trust and reputation management systems in wireless communications
    • Han Y, Zhiqi S, Chunyan M, Leung C, Niyato D,. Survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE 2010; 98 (10): 1755-1772.
    • (2010) Proceedings of the IEEE , vol.98 , Issue.10 , pp. 1755-1772
    • Han, Y.1    Zhiqi, S.2    Chunyan, M.3    Leung, C.4    Niyato, D.5
  • 10
    • 39049116456 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • Barcelona, Spain
    • Yan S, Wei Y, Zhu H, Ray KJL,. A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks, In Proceeding of IEEE INFOCOM, Barcelona, Spain, 2006; 1-13.
    • (2006) Proceeding of IEEE INFOCOM , pp. 1-13
    • Yan, S.1    Wei, Y.2    Zhu, H.3    Ray, K.J.L.4
  • 11
    • 36549067155 scopus 로고    scopus 로고
    • Trust-based security for wireless ad hoc and sensor networks
    • Boukerch A, Xu L, Khatib KE,. Trust-based security for wireless ad hoc and sensor networks. Computer Communications 2007; 30: 3905.
    • (2007) Computer Communications , vol.30 , pp. 3905
    • Boukerch, A.1    Xu, L.2    Khatib, K.E.3
  • 16
    • 80052880154 scopus 로고    scopus 로고
    • Autonomic trust management in a component based software system
    • Zheng Y,. Autonomic trust management in a component based software system. IEEE Transactions on Dependable and Secure Computing 2010; 8 (6): 810-823.
    • (2010) IEEE Transactions on Dependable and Secure Computing , vol.8 , Issue.6 , pp. 810-823
    • Zheng, Y.1
  • 17
    • 84928946195 scopus 로고    scopus 로고
    • Trust establishment in ad hoc and sensor networks
    • Efthimia A, Gritzalis A, Skianis G,. Trust establishment in ad hoc and sensor networks. CRITIS 2006; 12: 179-194.
    • (2006) CRITIS , vol.12 , pp. 179-194
    • Efthimia, A.1    Gritzalis, A.2    Skianis, G.3
  • 18
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Jsang A, Ismail R, Boyd C,. A survey of trust and reputation systems for online service provision. Decision Support Systems 2007; 43 (2): 618-644.
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Jsang, A.1    Ismail, R.2    Boyd, C.3
  • 19
    • 56749140937 scopus 로고    scopus 로고
    • Defense of trust management vulnerabilities in distributed networks
    • Yan S, Zhu H, Liu KJR,. Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine 2008; 46: 112-119.
    • (2008) IEEE Communications Magazine , vol.46 , pp. 112-119
    • Yan, S.1    Zhu, H.2    Liu, K.J.R.3
  • 20
    • 70349567489 scopus 로고    scopus 로고
    • Security threats scenario in trust and reputation models for distributed systems
    • Felix GM, Perez GM,. Security threats scenario in trust and reputation models for distributed systems. Computers and Security 2009; 28: 545-556.
    • (2009) Computers and Security , vol.28 , pp. 545-556
    • Felix, G.M.1    Perez, G.M.2
  • 21
    • 3042785862 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: Analysis and defenses
    • Berkeley, California, USA
    • Newsome J, Shi E, Song D, Perrig A,. The sybil attack in sensor networks: analysis and defenses, In Proceedings of IPSN '04, Berkeley, California, USA, 2004; 259-268.
    • (2004) Proceedings of IPSN '04 , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 24
    • 67249114800 scopus 로고    scopus 로고
    • Securing time-synchronization protocols in sensor networks: Attack detection and self-healing
    • New Orleans, LA, USA
    • Yang Y, Sun Y,. Securing time-synchronization protocols in sensor networks: attack detection and self-healing, In Proceeding of Global Telecommunications Conference, IEEE GLOBECOM, New Orleans, LA, USA, 2008; 1-6.
    • (2008) Proceeding of Global Telecommunications Conference, IEEE GLOBECOM , pp. 1-6
    • Yang, Y.1    Sun, Y.2
  • 26
    • 80052432106 scopus 로고    scopus 로고
    • A GTRSSN: Gaussian trust and reputation system for sensor networks
    • Mohammad M, Subhash Ch,. A GTRSSN: Gaussian trust and reputation system for sensor networks. SCSS 2007; 1: 343-347.
    • (2007) SCSS , vol.1 , pp. 343-347
    • Mohammad, M.1    Subhash, C.2
  • 28
    • 55849152101 scopus 로고    scopus 로고
    • Countering sinkhole and black hole attacks on sensor networks using dynamic trust management
    • Marrakech, Morocco
    • Roy SD, Singh SA, Choudhury S, Debnath NC,. Countering sinkhole and black hole attacks on sensor networks using dynamic trust management, In Proceedings of ISCC 2008, Marrakech, Morocco, 2008; 537-542.
    • (2008) Proceedings of ISCC 2008 , pp. 537-542
    • Roy, S.D.1    Singh, S.A.2    Choudhury, S.3    Debnath, N.C.4
  • 29
    • 79953777183 scopus 로고    scopus 로고
    • A survey of wormhole-based attacks and their countermeasures in wireless sensor networks
    • Meghdadi M, Ozdemir S, Gler I,. A survey of wormhole-based attacks and their countermeasures in wireless sensor networks. IETE Technical Review 2011; 28: 89-102.
    • (2011) IETE Technical Review , vol.28 , pp. 89-102
    • Meghdadi, M.1    Ozdemir, S.2    Gler, I.3
  • 30
    • 78751643529 scopus 로고    scopus 로고
    • Reputation-based role assignment for role-based access control in wireless sensor networks
    • Misra S, Vaish A,. Reputation-based role assignment for role-based access control in wireless sensor networks. Computer Communications 2011; 34: 281-294.
    • (2011) Computer Communications , vol.34 , pp. 281-294
    • Misra, S.1    Vaish, A.2
  • 31
    • 84856274467 scopus 로고    scopus 로고
    • Design and implementation of TARF: A trust-aware routing framework for WSNs
    • Zhan G, Shi W, Deng J,. Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing 2012; 9 (2): 184-197.
    • (2012) IEEE Transactions on Dependable and Secure Computing , vol.9 , Issue.2 , pp. 184-197
    • Zhan, G.1    Shi, W.2    Deng, J.3
  • 36
    • 84873883962 scopus 로고    scopus 로고
    • How the role-based trust management can be applied to wireless sensor networks
    • Felkner A,. How the role-based trust management can be applied to wireless sensor networks. Journal of Telecommunications and Information Technology 2012; 4: 70-77.
    • (2012) Journal of Telecommunications and Information Technology , vol.4 , pp. 70-77
    • Felkner, A.1
  • 37
    • 54949103489 scopus 로고    scopus 로고
    • Functional reputation based reliable data aggregation and transmission for wireless sensor networks
    • Ozdemir S,. Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Computer Communications 2008; 31: 3941-3953.
    • (2008) Computer Communications , vol.31 , pp. 3941-3953
    • Ozdemir, S.1
  • 38
    • 80155154403 scopus 로고    scopus 로고
    • A secure data aggregation based trust management approach for dealing with untrustworthy motes in sensor network
    • Taipei, Taiwan
    • Poolsappasit N, Madria S,. A secure data aggregation based trust management approach for dealing with untrustworthy motes in sensor network, In Proceedings of International Conference on Parallel Processing, Taipei, Taiwan, 2011; 138-147.
    • (2011) Proceedings of International Conference on Parallel Processing , pp. 138-147
    • Poolsappasit, N.1    Madria, S.2
  • 39
    • 67549118456 scopus 로고    scopus 로고
    • Secure. Data aggregation in wireless sensor networks: A comprehensive overview
    • Ozdemir S, Xiao Y,. Secure. Data aggregation in wireless sensor networks: a comprehensive overview. Computer Networks 2009; 53: 2022-2037.
    • (2009) Computer Networks , vol.53 , pp. 2022-2037
    • Ozdemir, S.1    Xiao, Y.2
  • 41
    • 79958778609 scopus 로고    scopus 로고
    • Dirichlet-based trust management for effective collaborative intrusion detection networks
    • Fung CJ, Zhang J, Boutaba R,. Dirichlet-based trust management for effective collaborative intrusion detection networks. IEEE Transactions on Network and Service Management 2011; 8 (2): 79-91.
    • (2011) IEEE Transactions on Network and Service Management , vol.8 , Issue.2 , pp. 79-91
    • Fung, C.J.1    Zhang, J.2    Boutaba, R.3
  • 42
    • 84862138560 scopus 로고    scopus 로고
    • Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
    • Bao F, Chen I, Chang MJ, Cho JH,. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management 2012; 9 (2): 169-183.
    • (2012) IEEE Transactions on Network and Service Management , vol.9 , Issue.2 , pp. 169-183
    • Bao, F.1    Chen, I.2    Chang, M.J.3    Cho, J.H.4
  • 48
    • 79959538975 scopus 로고    scopus 로고
    • Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): A comprehensive overview
    • Ishmanov F, Malik AS, Kim SW,. Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): a comprehensive overview. European Transactions on Telecommunications 2011; 22: 151-167.
    • (2011) European Transactions on Telecommunications , vol.22 , pp. 151-167
    • Ishmanov, F.1    Malik, A.S.2    Kim, S.W.3
  • 49
    • 78651546090 scopus 로고    scopus 로고
    • An extended energy consumption analysis of reputation-based trust management schemes of wireless sensor networks
    • Shaikh RA, Lee YK, Lee SY,. An extended energy consumption analysis of reputation-based trust management schemes of wireless sensor networks. Journal of Networks, Academy Publishers 2010; 5 (3): 283-291.
    • (2010) Journal of Networks, Academy Publishers , vol.5 , Issue.3 , pp. 283-291
    • Shaikh, R.A.1    Lee, Y.K.2    Lee, S.Y.3
  • 51
    • 42649129419 scopus 로고    scopus 로고
    • Future trust management framework for mobile ad hoc network
    • Jie L, Ruidong L, Jien K,. Future trust management framework for mobile ad hoc network. IEEE Communications Magazine 2008; 46: 108-114.
    • (2008) IEEE Communications Magazine , vol.46 , pp. 108-114
    • Jie, L.1    Ruidong, L.2    Jien, K.3
  • 52
    • 79960423670 scopus 로고    scopus 로고
    • Location-aware, trust-based detection and isolation of compromised nodes in WSNs
    • Garth VC, Lance H, Niki P,. Location-aware, trust-based detection and isolation of compromised nodes in WSNs. International Journal of Network Security 2011; 2: 107-113.
    • (2011) International Journal of Network Security , vol.2 , pp. 107-113
    • Garth, V.C.1    Lance, H.2    Niki, P.3
  • 53
    • 65549114586 scopus 로고    scopus 로고
    • Efficient monitoring approach for reputation system-based trust aware routing wireless sensor networks
    • Maarouf UB, Naseer AR,. Efficient monitoring approach for reputation system-based trust aware routing wireless sensor networks. IET Communications 2009; 3: 846-858.
    • (2009) IET Communications , vol.3 , pp. 846-858
    • Maarouf, U.B.1    Naseer, A.R.2
  • 54
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Yan S, Wei Y, Zhu H, Ray KRL,. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE JSAC 2006; 24: 305-317.
    • (2006) IEEE JSAC , vol.24 , pp. 305-317
    • Yan, S.1    Wei, Y.2    Zhu, H.3    Ray, K.R.L.4
  • 56
    • 79952097418 scopus 로고    scopus 로고
    • A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory
    • Feng R, Xu X, Zhou X, Wan J,. A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory. Sensors 2011; 11: 1345-1360.
    • (2011) Sensors , vol.11 , pp. 1345-1360
    • Feng, R.1    Xu, X.2    Zhou, X.3    Wan, J.4
  • 59
    • 78651556986 scopus 로고    scopus 로고
    • Trust evaluation and dynamic routing decision based on fuzzy theory for MANETs
    • Hongjun D, Zhiping J, Zhiwei Q,. Trust evaluation and dynamic routing decision based on fuzzy theory for MANETs. Journal of Software 2009; 4: 1091-1101.
    • (2009) Journal of Software , vol.4 , pp. 1091-1101
    • Hongjun, D.1    Zhiping, J.2    Zhiwei, Q.3
  • 60
    • 79251588431 scopus 로고    scopus 로고
    • Expert security system in wireless sensor networks based on fuzzy discussion multi-agent system
    • Shahaboddin Sh, Samira K, Zeinab SD, Liang SN,. Expert security system in wireless sensor networks based on fuzzy discussion multi-agent system. Scientific Research and Essays 2010; 5: 3840-3849.
    • (2010) Scientific Research and Essays , vol.5 , pp. 3840-3849
    • Shahaboddin, S.1    Samira, K.2    Zeinab, S.D.3    Liang, S.N.4
  • 62
    • 77949974817 scopus 로고    scopus 로고
    • PLUS: Parameterised localised trust management-based security framework for sensor networks
    • Zhiying Y, Ki D, Do YM,. PLUS: parameterised localised trust management-based security framework for sensor networks. International Journal of Sensor Networks 2008; 3: 224-236.
    • (2008) International Journal of Sensor Networks , vol.3 , pp. 224-236
    • Zhiying, Y.1    Ki, D.2    Do, Y.M.3
  • 63
    • 78651550185 scopus 로고    scopus 로고
    • Power-aware and reliable sensor selection based on trust for wireless sensor networks
    • Han G, Lei S, Ma J, Park JH, Ni J,. Power-aware and reliable sensor selection based on trust for wireless sensor networks. Journal of Communications 2010; 5: 23-30.
    • (2010) Journal of Communications , vol.5 , pp. 23-30
    • Han, G.1    Lei, S.2    Ma, J.3    Park, J.H.4    Ni, J.5
  • 66
  • 70
    • 84864242377 scopus 로고    scopus 로고
    • Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks
    • San Francisco, CA, USA
    • Cho Y, Qu G, Wu Y,. Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks, In IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 2012; 134-141.
    • (2012) IEEE Security and Privacy Workshops (SPW) , pp. 134-141
    • Cho, Y.1    Qu, G.2    Wu, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.