{"title":"无线传感器网络中基于声誉信任的证据理论","authors":"A. Matheus, Björn Stelte","doi":"10.1145/2345316.2345360","DOIUrl":null,"url":null,"abstract":"Attacks like fault data injection are not easy to prevent in resource-limited sensor networks. Especially in environments with urgent decision making trustworthy sensor networks are mandatory. Redundancy can be used to detect and isolate malicious behaving nodes and thus to secure the network. The presented approach implements trust based on off-the-shelf wireless sensor nodes and is more power efficient than one-single trusted node implementations with TPM technology.","PeriodicalId":400763,"journal":{"name":"International Conference and Exhibition on Computing for Geospatial Research & Application","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Evidence theory for reputation-based trust in wireless sensor networks\",\"authors\":\"A. Matheus, Björn Stelte\",\"doi\":\"10.1145/2345316.2345360\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Attacks like fault data injection are not easy to prevent in resource-limited sensor networks. Especially in environments with urgent decision making trustworthy sensor networks are mandatory. Redundancy can be used to detect and isolate malicious behaving nodes and thus to secure the network. The presented approach implements trust based on off-the-shelf wireless sensor nodes and is more power efficient than one-single trusted node implementations with TPM technology.\",\"PeriodicalId\":400763,\"journal\":{\"name\":\"International Conference and Exhibition on Computing for Geospatial Research & Application\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference and Exhibition on Computing for Geospatial Research & Application\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2345316.2345360\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference and Exhibition on Computing for Geospatial Research & Application","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2345316.2345360","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evidence theory for reputation-based trust in wireless sensor networks
Attacks like fault data injection are not easy to prevent in resource-limited sensor networks. Especially in environments with urgent decision making trustworthy sensor networks are mandatory. Redundancy can be used to detect and isolate malicious behaving nodes and thus to secure the network. The presented approach implements trust based on off-the-shelf wireless sensor nodes and is more power efficient than one-single trusted node implementations with TPM technology.