首页> 外文期刊>Circuits and systems >A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
【24h】

A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications

机译:防御无线传感器网络出轨攻击的紧凑型信任计算和管理方法及其应用

获取原文
获取原文并翻译 | 示例
           

摘要

One of the most effective measurements of intercommunication and collaboration in wireless sensor networks which leads to provide security is Trust Management Most popular decision making systems used to collaborate with a stranger are tackled by two different existing trust management systems: one is a policy-based approach which verifies the decision built on logical properties and functionalities; the other approach is reputation-based approach which verifies the decision built on physical properties and functionalities of WSN. Proofless authorization, unavailability, vagueness and more complexity cause decreased detection rate and spoil the efficacy of the WSN in existing approaches. Some of the integrated approaches are utilized to improve the significance of the trust management strategies. In this paper, a Compact Trust Computation and Management (CTCM) approach is proposed to overcome the limitations of the existing approaches, also it provides a strong objective security with the calculability and the available security implications. Finally, the CTCM approach incorporates the optimum trust score for logical and physical investigation of the network resources. The simulation based experiment results show that the CTCM compact trust computation and management approach can provide an efficient defending mechanism against derailing attacks in WSN.
机译:信任管理在无线传感器网络中提供安全性的最有效的互通和协作度量之一是信任管理。与陌生人协作的最流行的决策系统由两种不同的现有信任管理系统解决:一种是基于策略的方法验证基于逻辑属性和功能的决策;另一种方法是基于信誉的方法,该方法可验证基于WSN的物理属性和功能的决策。未经证明的授权,不可用性,含糊不清和更多的复杂性会导致检测率下降,并破坏现有方法中WSN的效力。利用一些集成方法来提高信任管理策略的重要性。本文提出了一种紧凑型信任计算和管理(CTCM)方法,以克服现有方法的局限性,它还提供了强大的客观安全性以及可计算性和可用的安全隐患。最后,CTCM方法结合了最佳信任分数,可以对网络资源进行逻辑和物理调查。基于仿真的实验结果表明,CTCM紧凑信任计算和管理方法可以为WSN中的脱轨攻击提供有效的防御机制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号