Belief and Reputation Based Recommended Trust Computation in Wireless Sensor Networks
نویسندگان
چکیده
Due to limited capacity of individual node, cooperation is a feasible solution to cope with complex task in wireless sensor networks (WSNs). However, node cooperation might be launched with an unreliable collaborative group in large-scaled WSN. To solve this challenge, a node can be organized through recommendation. In this paper, we propose a belief and reputation based recommended trust computation mechanism, which is used to build up creditable relationships among strange nodes. Firstly, we define subjective trustable relationship among nodes, named belief, and objective common trust view, named reputation, for nodes in WSNs. Then, we present a recommended trust computation based on aforementioned two notions. The recommended trust computation is divided into three aspects, i.e., recommended trust computation with different route composition, objective coincidence and optional degree. Furthermore, a recommended trust computation framework (RTCF) and its related proofs are proposed. Finally, we give example and examinations to further explain the efficiency and feasibility of our mechanism. Copyright © 2013 IFSA.
منابع مشابه
Trust-based security for wireless ad hoc and sensor networks
Wireless sensors networks are susceptible to a large number of security threats, and because of the communication, computation and delay constraints of most applications that run on top of these networks, traditional security mechanisms cannot be used. Trust and reputation have been recently suggested as an effective security mechanism for open environments such as the Internet, and considerabl...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملDynamical Trust and Reputation Computation Model for B2C E-Commerce
Trust is one of the most important factors that influence the successful application of network service environments, such as e-commerce, wireless sensor networks, and online social networks. Computation models associated with trust and reputation have been paid special attention in both computer societies and service science in recent years. In this paper, a dynamical computation model of repu...
متن کاملDynamic Obstacle Avoidance by Distributed Algorithm based on Reinforcement Learning (RESEARCH NOTE)
In this paper we focus on the application of reinforcement learning to obstacle avoidance in dynamic Environments in wireless sensor networks. A distributed algorithm based on reinforcement learning is developed for sensor networks to guide mobile robot through the dynamic obstacles. The sensor network models the danger of the area under coverage as obstacles, and has the property of adoption o...
متن کاملReputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review
Cryptographic mechanisms alone are insufficient to protect Wireless Sensor Networks (WSNs), because sensors are deployed for long periods in hostile environments where it is possible for an adversary to physically take over a sensor and obtain access to the cryptographic keys stored in the sensor’s internal memory. Thus, reputation-based trust systems are employed to detect abnormal activities ...
متن کامل