{"title":"Evidence theory for reputation-based trust in wireless sensor networks","authors":"A. Matheus, Björn Stelte","doi":"10.1145/2345316.2345360","DOIUrl":null,"url":null,"abstract":"Attacks like fault data injection are not easy to prevent in resource-limited sensor networks. Especially in environments with urgent decision making trustworthy sensor networks are mandatory. Redundancy can be used to detect and isolate malicious behaving nodes and thus to secure the network. The presented approach implements trust based on off-the-shelf wireless sensor nodes and is more power efficient than one-single trusted node implementations with TPM technology.","PeriodicalId":400763,"journal":{"name":"International Conference and Exhibition on Computing for Geospatial Research & Application","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference and Exhibition on Computing for Geospatial Research & Application","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2345316.2345360","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Attacks like fault data injection are not easy to prevent in resource-limited sensor networks. Especially in environments with urgent decision making trustworthy sensor networks are mandatory. Redundancy can be used to detect and isolate malicious behaving nodes and thus to secure the network. The presented approach implements trust based on off-the-shelf wireless sensor nodes and is more power efficient than one-single trusted node implementations with TPM technology.