跳到主要导航 跳到搜索 跳到主要内容

Management and applications of trust in Wireless Sensor Networks: A survey

  • Guangjie Han*
  • , Jinfang Jiang
  • , Lei Shu
  • , Jianwei Niu
  • , Han Chieh Chao
  • *此作品的通讯作者

科研成果: 期刊稿件文章同行评审

摘要

Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation and delay constraints of WSNs, traditional security mechanisms cannot be used. Trust management models have been recently suggested as an effective security mechanism for WSNs. Considerable research has been done on modeling and managing trust. In this paper, we present a detailed survey on various trust models that are geared towards WSNs. Then, we analyze various applications of trust models. They are malicious attack detection, secure routing, secure data aggregation, secure localization and secure node selection. In addition, we categorize various types of malicious attacks against trust models and analyze whether the existing trust models can resist these attacks or not. Finally, based on all the analysis and comparisons, we list several trust best practices that are essential for developing a robust trust model for WSNs.

源语言英语
页(从-至)602-617
页数16
期刊Journal of Computer and System Sciences
80
3
DOI
出版状态已出版 - 5月 2014

指纹

探究 'Management and applications of trust in Wireless Sensor Networks: A survey' 的科研主题。它们共同构成独一无二的指纹。

引用此