{"title":"Distributed Event-Triggered Trust Management for Wireless Sensor Networks","authors":"Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Q. Peng","doi":"10.1109/IAS.2009.69","DOIUrl":null,"url":null,"abstract":"Trust management is an important issue in wireless sensor networks (WSNs). In this paper, we introduce the concept of trust and design a distributed event- triggered trust management model for WSNs. It combines cryptography, statistics, economics, data analysis and the other related fields. In this way, we can immediately identify and isolate the malice node, thereby creating a secure and reliable wireless sensor networks that can avoid some common attacks and ensure the security of the applications. And, we give the communication process and the computation model as well as how each trust management module works. So it is no longer a simple calculation model or a simple frame structure, and it has realistic feasibility and operability.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fifth International Conference on Information Assurance and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAS.2009.69","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Trust management is an important issue in wireless sensor networks (WSNs). In this paper, we introduce the concept of trust and design a distributed event- triggered trust management model for WSNs. It combines cryptography, statistics, economics, data analysis and the other related fields. In this way, we can immediately identify and isolate the malice node, thereby creating a secure and reliable wireless sensor networks that can avoid some common attacks and ensure the security of the applications. And, we give the communication process and the computation model as well as how each trust management module works. So it is no longer a simple calculation model or a simple frame structure, and it has realistic feasibility and operability.