Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal on Communications》 2010-12
Add to Favorite Get Latest Update

Fuzzy trust model for wireless sensor networks with intrusion tolerance

WANG Liang-min1,GUO Yuan-bo2,ZHAN Yong-zhao1(1.School of Computer Science and Communication Engineering,Jiangsu University,Zhenjiang 212013,China; 2.School of Electronic Technology,Information Engineering University of PLA,Zhengzhou 450004,China)  
To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation and the example were given to show the per-formances of using the model to detect or tolerate the insidious attacks.Finally,the package drop ration of the networks with the trust evaluation system was simulated and the comparison with the related work was discussed.
【Fund】: 国家自然科学基金项目(60703115);; 国家高技术研究发展计划(“863”计划)基金资助项目(2007AA01Z405);; 国家社科基金资助项目(09CTJ006);; 中国博士后科学基金资助项目(200801357 20070420955);; 江苏省博士后科研基金资助项目(0702003B);; 江苏省青蓝工程基金资助项目;; 江苏大学科研启动经费基金资助项目(07JDG080)~~
【CateGory Index】: TN929.5;TP212.9
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 5 Hits
1 WANG Liang-min,MA Jian-feng,WANG Chao (Key Laboratory of Computer Network and Information Security of Education Ministry,Xidian University,Xi'an,Shaanxi 710071,China);Degree of Fault-Tolerance and Intrusion-Tolerance for Topologies of Wireless Sensor Networks[J];Acta Electronica Sinica;2006-08
2 Wang Liangmin1,2 and Ma Jianfeng3 1(School of Computer Science and Engineering, Southeast University, Nanjing 210096) 2(School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu 212013) 3(Ministry of Education Key Laboratory of Computer Network and Information Security, Xidian University, Xi’an 710071);Self-Regeneration Based Method for Topology Control with Intrusion Tolerance in Wireless Sensor Networks[J];Journal of Computer Research and Development;2009-10
3 XIAO De-Qin1,2 FENG Jian-Zhao1 YANG Bo1 ZHANG Huan-Guo2(College of Information, South China Agriculture University, Guangzhou 510642)1(State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072)2;Reputation Formal Model for Wireless Sensor Network[J];Computer Science;2007-06
4 JING Qi~(1,2) TANG Li-Yong~(1,2+) CHEN Zhong~(1,2) 1 (Network and Information Security Laboratory,Institute of Software,School of Electronics Engineering and Computer Science,Peking University,Beijing 100871,China) 2 (Key Laboratory of High Confidence Software Technoloies of the Ministry of Education,Peking University,Beijing 100871,China);Trust Management in Wireless Sensor Networks[J];Journal of Software;2008-07
5 YANG Guang~1,YIN Gui-sheng~2,YANG Wu~2,GENG Gui-ning~3 (1.China Information Technology Security Evaluation Center,Beijing 100085,China; 2.Information Security Research Center,Harbin Engineering University,Harbin 150001,China; 3.Information Security Center,Beijing University of Posts and Telecommunications,Beijing 100876,China);Reputation model based on behaviors of sensor nodes in WSN[J];Journal on Communications;2009-12
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 YE Qing,ZHOU Ming-zheng(Coll.of Comp.Sci.& Engn.,Anhui Polytechnic University,Wuhu 241000,China);An authentication technique based on "radical station" correspondence principle in wireless sensor networks[J];Journal of Anhui University of Technology and Science(Natural Science);2010-02
2 Ding XiaoyuLiu Jianwei Shao Dingrong(School of Electronics and Information Engineering,Beijing University of Aeronautics and Astronautics,Beijing 100191,China);New pairwise key predistribution scheme for wireless sensor networks[J];Journal of Beijing University of Aeronautics and Astronautics;2009-09
3 Kang Yimei(School of Software,Beijing University of Aeronautics and Astronautics,Beijing 100191,China)Wang Tao(Army 93756,Tianjin 300131,China)Hu Jiang(Beijing Institute of Computer Technology and Application,Beijing 100089,China)Zhao Lei(School of Software,Beijing University of Aeronautics and Astronautics,Beijing 100191,China);Semantic security algorithm for wireless sensor network[J];Journal of Beijing University of Aeronautics and Astronautics;2010-09
4 HU Wen-ji,XU Ming-wei (Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China);Analysis of Security Routing Protocol for Wireless Sensor Networks[J];Journal of Beijing University of Posts and Telecommunications;2006-S1
5 LUO Wei,HU Xiang-dong(School of Automation,Chongqing University of Posts and Telecommunications,Chongqing 400065,P.R China);Efficient and secure data aggregation protocol for wireless sensor networks[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition);2009-01
6 WEI Wei1,2,SHI Hao-Shan1,LIU Ming21. Electronics and Information Institute Northwestern Polytechnical University, Xi’an 710072,China;2. Telecommunication Engineering Institute, Air Force Engineering University, Xi’an 710077,China;Layered Multipath Routing Scheme for Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-06
7 YING Bi-di,CHEN Hui-fang,ZHAO Wen-dao,QIU Pei-liangDept.of Information Science and Electronic Engineering Zhejiang Univ.Hangzhou 310027,China;Low-Power Key Pre-Distribution Scheme in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
8 JIANG Yi,SHI Hao-shan(School of Electronics and Information,Northwestern Polytechnical University,Xi'an 710072,China);Merkle Tree Based Broadcast Authentication Strategies in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
9 FANG Qian,ZHAO Xiao-qun*(College of electronic and information engineering,Tongji university,shanghai 200092,China);A Secure Geographic Integrated Protocol for Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-05
10 WU Di,HU Gang,NI Gang,LI Wei,ZHANG Zhuo(College of Computer and Information Engineering,Hohai University,Changzhou Jiangsu 213022,China);Research on Secure Routing Protocols in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-07
China Proceedings of conference Full-text Database 10 Hits
1 CHEN Shuai a,ZHONG Xianxin b,LIAO Xiaowei a,SHI Junfeng b aElectronic staff room in physics department,Huainan Normal University,Huainan,Anhui,China,232001;bKey Lab for Optoelectronic Technology&System of China Ministry of Education,Chongqing University,Chongqing 400030;Prolong Minimum Period of Integer Chaos Child Key for Wireless Sensor Network Security[A];[C];2007
2 HU Wen-ji, XU Ming-wei (Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China);Analysis of Security Routing Protocol for Wireless Sensor Networks[A];[C];2006
3 Fang Qian ZhaoXiaoqun (College of Electronic& Information Engineering,Tongji University,Shanghai,200092,China);A Secure Geographic Stateless Routing for Wireless Sensor Networks[A];[C];2008
4 Liu Linlin~1 Bi Hongjun Zhang Xihong~3 (1 Electronics and Information Engineering School of Beijing Jiaotong University 100044; 2 Computer Engineering Department of Shijiazhuang Ordnance Engineering College 050003);Fault Tolerance of Wireless Sensor Networks[A];[C];2008
5 ZHANG Jizan School of Mathematics and Message,Ludong University,Yantai 264025;A Key Distribution Scheme Based on Layers in Clustered Wireless Sensor Network[A];[C];2008
6 ZHENG Xiao-qian (College of Mechanical and Electronic Engineering,Guizhou Normal University,Guiyang 550014,China);Research and Analysis of Security in Wireless Sensor Networks[A];[C];2010
7 Yao Xuanxia , Zheng Xuefeng (Department of Computer,University of Science and Technoloy Beijing,100083,China);Research on the Security for Wireless Sensor Networks[A];[C];2006
8 Zhao Zhibin,Dong Xiaomei,Yao Lan,Yu Ge Faculty of Information Science and Engineering,Northeastern University,Shenyang 110004,China;Research on Biological Immunity Principle Based Security Model for Wireless Sensor Network[A];[C];2009
9 Zhang Zhijiang~(1,2) Tang Hong~1 Zhu Liehuang~1 Wang Zhiyuan~3 ~1 Beijing Laboratory of Intelligent Information Technology,School of Computer Science,Beijing Institute of Technology,Beijing 100081; ~2 The Electronic Technology Institute of Air Force,Beijing 100089; ~3 PLA Information Engineering College Information Technology Institute,Zhenzhou 450002;A Certificate-Based Security and Authentication Scheme for Wireless Sensor Networks[A];[C];2008
10 Su Shijuan Shi Weiren Zhou Wei Shi Xin (College of Automation,Chongqing University,Chongqing 400044 China);Research on security mechanism of integrating wireless sensor networks and RFID for pervasive computing[A];[C];2010
【Secondary Citations】
Chinese Journal Full-text Database 7 Hits
1 WANG Liang-min,MA Jian-feng,WANG Chao (Key Laboratory of Computer Network and Information Security of Education Ministry,Xidian University,Xi'an,Shaanxi 710071,China);Degree of Fault-Tolerance and Intrusion-Tolerance for Topologies of Wireless Sensor Networks[J];Acta Electronica Sinica;2006-08
2 Cui Li Ju Hailing, Miao Yong, Li Tianpu, Liu Wei, and Zhao Ze(Institute of Computing Technology, Chinese Academy of Sciences , Beijing 100080)(Graduate School of the Chinese Academy of Sciences , Beijing 100039);Overview of Wireless Sensor Networks[J];Journal of Computer Research and Development;2005-01
3 XIAO De-Qin1,2 FENG Jian-Zhao1 YANG Bo1 ZHANG Huan-Guo2(College of Information, South China Agriculture University, Guangzhou 510642)1(State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072)2;Reputation Formal Model for Wireless Sensor Network[J];Computer Science;2007-06
4 XIAO De-Qin 1) ZHOU Quan 2) ZHANG Huan-Guo 3) LIU Cai-Xing 4) 1) (State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing 100080) 2) (Institute of Information Security, Department of Mathematics,;Analyzing Encryption Protocols Based on Temporal Logic[J];Chinese Journal of Computers;2002-10
5 YU Bo YANG Min WANG Zhi GAO Chuan-Shan(Department of Computer Science and Engineering,Fudan University,Shanghai 200433);Identify Abnormal Packet Loss in Selective Forwarding Attacks[J];Chinese Journal of Computers;2006-09
6 CHEN Li-Jun1),2) MAO Ying-Chi1),2) CHEN Dao-Xu1),2) XIE Li1),2) 1)(State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093) 2)(The Cooperative Laboratory for Mobile and Wireless Sensor Networks of Nanjing University and Hong Kong Polytechnic University, Nanjing 210093);Topology Control of Wireless Sensor Networks Under an Average Degree Constraint[J];Chinese Journal of Computers;2007-09
7 PEI Qing-qi1,SHEN Yu-long1,2,MA Jian-feng1,2(1.Key Laboratory of Computer Networks and Information Security,Ministry of Education,Xi’an 710071,China;2.School of Computer Science & Technology Xidian University,Key Laboratory of Computer Networks,Xi’ an 710071,China);Survey of wireless sensor network security techniques[J];Journal on Communications;2007-08
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved