{"title":"无线传感器网络中的信任与声誉","authors":"Lara Saleh, Anas Abu Taleb, W. Salameh","doi":"10.1109/ACIT50332.2020.9300101","DOIUrl":null,"url":null,"abstract":"The wireless sensor networks are characterized by the infrastructure less configuring these sensors are used in different application such in defense, healthcare and in some applications that take care of the early detection of forest fires, also the wireless sensors networks can be in remote areas for long periods so because of the natural and the use of these sensors they are subject to exposure many security attacks; So the reputation-based trust systems was developed to keep the eye on the un normal activities, this paper listed the attacks that the wireless sensor networks may suffer from and listed trust models in these networks and finally the immunity of the trust models from the malicious attacks is shown.","PeriodicalId":193891,"journal":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Trust and reputation in Wireless Sensors networks\",\"authors\":\"Lara Saleh, Anas Abu Taleb, W. Salameh\",\"doi\":\"10.1109/ACIT50332.2020.9300101\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The wireless sensor networks are characterized by the infrastructure less configuring these sensors are used in different application such in defense, healthcare and in some applications that take care of the early detection of forest fires, also the wireless sensors networks can be in remote areas for long periods so because of the natural and the use of these sensors they are subject to exposure many security attacks; So the reputation-based trust systems was developed to keep the eye on the un normal activities, this paper listed the attacks that the wireless sensor networks may suffer from and listed trust models in these networks and finally the immunity of the trust models from the malicious attacks is shown.\",\"PeriodicalId\":193891,\"journal\":{\"name\":\"2020 21st International Arab Conference on Information Technology (ACIT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 21st International Arab Conference on Information Technology (ACIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACIT50332.2020.9300101\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 21st International Arab Conference on Information Technology (ACIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACIT50332.2020.9300101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The wireless sensor networks are characterized by the infrastructure less configuring these sensors are used in different application such in defense, healthcare and in some applications that take care of the early detection of forest fires, also the wireless sensors networks can be in remote areas for long periods so because of the natural and the use of these sensors they are subject to exposure many security attacks; So the reputation-based trust systems was developed to keep the eye on the un normal activities, this paper listed the attacks that the wireless sensor networks may suffer from and listed trust models in these networks and finally the immunity of the trust models from the malicious attacks is shown.