{"title":"无线传感器网络中节点选择的跨层信任模型与算法","authors":"Bin Ma","doi":"10.1109/ICCSN.2009.67","DOIUrl":null,"url":null,"abstract":"In Wireless Sensor Networks, nodes assist each other by passing data and control packets from one node to another. In a complex WSN, malicious nodes are well disguised so that they can purposely attack the whole network using the natural co-operations of sensors. To overcome this, we study trust mechanism in the human society and introduce it into a WSN. We also construct a cross-layer trust model based on cloud theory in accordance with the characteristics of a WSN. Based on trust model, we propose a node selection algorithm for wireless sensor networks. The experiment results show that our algorithm can improve the system security and performance of wireless sensor networks, and efficiently defend against the attacks of malicious nodes.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Cross-Layer Trust Model and Algorithm of Node Selection in Wireless Sensor Networks\",\"authors\":\"Bin Ma\",\"doi\":\"10.1109/ICCSN.2009.67\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In Wireless Sensor Networks, nodes assist each other by passing data and control packets from one node to another. In a complex WSN, malicious nodes are well disguised so that they can purposely attack the whole network using the natural co-operations of sensors. To overcome this, we study trust mechanism in the human society and introduce it into a WSN. We also construct a cross-layer trust model based on cloud theory in accordance with the characteristics of a WSN. Based on trust model, we propose a node selection algorithm for wireless sensor networks. The experiment results show that our algorithm can improve the system security and performance of wireless sensor networks, and efficiently defend against the attacks of malicious nodes.\",\"PeriodicalId\":177679,\"journal\":{\"name\":\"2009 International Conference on Communication Software and Networks\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-02-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Communication Software and Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSN.2009.67\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Communication Software and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSN.2009.67","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cross-Layer Trust Model and Algorithm of Node Selection in Wireless Sensor Networks
In Wireless Sensor Networks, nodes assist each other by passing data and control packets from one node to another. In a complex WSN, malicious nodes are well disguised so that they can purposely attack the whole network using the natural co-operations of sensors. To overcome this, we study trust mechanism in the human society and introduce it into a WSN. We also construct a cross-layer trust model based on cloud theory in accordance with the characteristics of a WSN. Based on trust model, we propose a node selection algorithm for wireless sensor networks. The experiment results show that our algorithm can improve the system security and performance of wireless sensor networks, and efficiently defend against the attacks of malicious nodes.