• DocumentCode
    3437606
  • Title

    Computation and analysis of node intending trust in WSNs

  • Author

    Liqin, Tian ; Chuang, Lin

  • Author_Institution
    Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing, China
  • fYear
    2010
  • fDate
    25-27 June 2010
  • Firstpage
    496
  • Lastpage
    499
  • Abstract
    The resource constraints of wireless sensor network make it easy to attack and hard to protect. Although carefully designed cryptography and authentication help to make WSN securer, they are not good at dealing with compromised node and ageing node, whose misbehavior may impair the function of WSN. Behavior-based trust mechanism is considered as the effective supplement of traditional cryptography security, it has been widely studied in peer-to-peer network, the grid, and the pervasive computing environment. The evaluation of node trust is based on the past behavior evidence, but we hope to know the node future trust, so node trust prediction is important and significant for wireless sensor networks application such as routing, data fusion. The paper discusses how to based on past node trust to predict future node trust, including Bayesian Network modeling, prediction grading, computation of prior probabilities of node trust, computation of prior probabilities of node attribute and prediction of future node trust. In order to meet needs of different prediction of node trust for different purpose, we also discuss that how to get and store node past assorted behavior statistical data. Finally, discuss how to predict node trust in real system and how to control routing, data fusion based on prediction result.
  • Keywords
    Aging; Authentication; Computer networks; Cryptography; Peer to peer computing; Pervasive computing; Probability; Protection; Routing; Wireless sensor networks; Behavior control; Future behavior trust; Multi-condition trust prediction; Wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on
  • Conference_Location
    Beijing, China
  • Print_ISBN
    978-1-4244-5850-9
  • Type

    conf

  • DOI
    10.1109/WCINS.2010.5541828
  • Filename
    5541828