A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value
نویسندگان
چکیده
منابع مشابه
Trust Based Voting Scheme and Optimal Multipath Routing for Intrusion Tolerance in Wireless Sensor Network
Wireless sensor networks (WSNs) deployed in unattended environment energy recharging is difficult. WSN satisfy application specific QoS requirements i.e., reliability, timeliness, security and minimize energy consumption to prolong system useful lifetime with limited resources. The drawbacks of existing work include redundancy management scheme that did not addresses heavy query traffic. Ambigu...
متن کاملStrong Barrier Coverage for Intrusion Detection in Wireless Sensor Network
Due to the feature of self-organization and selfconfiguration of wireless sensor networks, it is very suitable for the application of intrusion detection, such as national boundary monitoring. As for the cost of sensor nodes, deriving the critical density is a fundamental problem for intrusion detection. Recently there has been a lot of research on the problem of intrusion detection by modeling...
متن کاملAn Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks
LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...
متن کاملA Trust-based Probabilistic Coverage Algorithm for Wireless Sensor Networks
Sensing coverage is a fundamental issue for many applications in wireless sensor networks. Due to sensors resource limitations, inherent uncertainties associated with their measurements, and the harsh and dynamic environment in which they are deployed, having a QoS-aware coverage scheme is a must. In this paper, we propose a Trust-based Probabilistic Coverage algorithm, which leverages the trus...
متن کاملTrust Intrusion Detection System Based on Location for Wireless Sensor Network
Despite the rapid development of WSNs and its increasing integrations in different areas, they remain very vulnerable to attacks because of their limitation of resources and their brittle use. Several trusted works have been developed for this purpose. Despite the robustness of the same trust model from literature, they do not take into account the most attacks that threaten wireless sensor net...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Sensors
سال: 2015
ISSN: 1687-725X,1687-7268
DOI: 10.1155/2015/430456