A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust Based Voting Scheme and Optimal Multipath Routing for Intrusion Tolerance in Wireless Sensor Network

Wireless sensor networks (WSNs) deployed in unattended environment energy recharging is difficult. WSN satisfy application specific QoS requirements i.e., reliability, timeliness, security and minimize energy consumption to prolong system useful lifetime with limited resources. The drawbacks of existing work include redundancy management scheme that did not addresses heavy query traffic. Ambigu...

متن کامل

Strong Barrier Coverage for Intrusion Detection in Wireless Sensor Network

Due to the feature of self-organization and selfconfiguration of wireless sensor networks, it is very suitable for the application of intrusion detection, such as national boundary monitoring. As for the cost of sensor nodes, deriving the critical density is a fundamental problem for intrusion detection. Recently there has been a lot of research on the problem of intrusion detection by modeling...

متن کامل

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

متن کامل

A Trust-based Probabilistic Coverage Algorithm for Wireless Sensor Networks

Sensing coverage is a fundamental issue for many applications in wireless sensor networks. Due to sensors resource limitations, inherent uncertainties associated with their measurements, and the harsh and dynamic environment in which they are deployed, having a QoS-aware coverage scheme is a must. In this paper, we propose a Trust-based Probabilistic Coverage algorithm, which leverages the trus...

متن کامل

Trust Intrusion Detection System Based on Location for Wireless Sensor Network

Despite the rapid development of WSNs and its increasing integrations in different areas, they remain very vulnerable to attacks because of their limitation of resources and their brittle use. Several trusted works have been developed for this purpose. Despite the robustness of the same trust model from literature, they do not take into account the most attacks that threaten wireless sensor net...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Sensors

سال: 2015

ISSN: 1687-725X,1687-7268

DOI: 10.1155/2015/430456