A Query Based Trust Evaluation Scheme for Emergency Response Communication Networks
نویسندگان
چکیده
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. This requires the generation and exchange of current information among first responders and emergency management centers in real time for making life saving decisions. Normally, the traditional communication infrastructures such as landline or cellular networks are damaged and don’t provide adequate services to first responders for exchanging emergency related information. Mobile ad hoc networks are commonly used as communication means during emergency response operations. Reliable and robust communication is vital for efficient emergency response operations. In large scale emergency response, various rescue teams from different rescue organizations participate for controlling the emergency situation. As the nodes from different rescue organizations join the same emergency response network, there is a possibility that some of the nodes may demonstrate selfish or malicious behavior. A node may experience some damage during emergency management operations that prevents it from forwarding the packets successfully. The communication interruptions among first responders and emergency
منابع مشابه
Trust-based security for wireless ad hoc and sensor networks
Wireless sensors networks are susceptible to a large number of security threats, and because of the communication, computation and delay constraints of most applications that run on top of these networks, traditional security mechanisms cannot be used. Trust and reputation have been recently suggested as an effective security mechanism for open environments such as the Internet, and considerabl...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملSink Location Service Based on Fano Plane in Wireless Sensor Networks
Sink location is considered as a basic service in geographic routing in wireless sensor networks. Obtaining the location of sink node by source node using an efficient method with low complexity has always been a challenging issue in research. In this paper, a sink location algorithm based on Fano plane is proposed. The research challenge is how to ensure the intersection of two SLQ (Location Q...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کامل