Evaluation Model of Node Trust in Ship Wireless Sensor Networks

2019 ◽  
Vol 93 (sp1) ◽  
pp. 729
Author(s):  
Jingchun Niu
2010 ◽  
Vol 159 ◽  
pp. 29-34
Author(s):  
Shu Ming Xiong ◽  
Xiao Qian Qu ◽  
Yong Zhao Zhan ◽  
Xin Sheng Wang ◽  
Liang Min Wang

Due to the node failures incurred by intrusion threat, a wireless sensor networks will initiate topology re-generation, which is based on correct availability evaluation of current intrusion-tolerant topology. The paper proposes an availability evaluation model based on semi-Markov process (SMP) to estimate topology availability of the intrusion-tolerant topology concerning the effects from intrusion behaviors. In view of some limitations of node computation ability and storage ability, this model reduces the complexities resulting from modeling the different intrusion threats and is set up on the uniform intruding results to simplify the model design. Using the DTMC model embedded in SMP topology availability is computed and finally we analyze the sensitivity to parameters in the model.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Zhiming Zhang ◽  
Yu Yang ◽  
Wei Yang ◽  
Fuying Wu ◽  
Ping Li ◽  
...  

The current detection schemes of malicious nodes mainly focus on how to detect and locate malicious nodes in a single path; however, for the reliability of data transmission, many sensor data are transmitted by multipath in wireless sensor networks. In order to detect and locate malicious nodes in multiple paths, in this paper, we present a homomorphic fingerprinting-based detection and location of malicious nodes (HFDLMN) scheme in wireless sensor networks. In the HFDLMN scheme, using homomorphic fingerprint and coding technology, the original data is divided into n packets and sent to the base station along n paths, respectively; the base station determines whether there are malicious nodes in each path by verifying the validity of the packets; if there are malicious nodes in one or more paths, the location algorithm of the malicious node is implemented to locate the specific malicious nodes in the path; if all the packets are valid, the original data is recovered. The HFDLMN scheme does not need any complex evaluation model to evaluate and calculate the trust value of the node, nor any monitoring nodes. Theoretical analysis results show that the HFDLMN scheme is secure and effective. The simulation results demonstrate promising outcomes with respect to key parameters such as the detection probability of the malicious path and the locating probability of the malicious node.


2016 ◽  
Vol 21 (12) ◽  
pp. 3377-3385 ◽  
Author(s):  
Nan Jiang ◽  
Bin Li ◽  
Pingan Pan ◽  
Tao Wan ◽  
Lingfeng Liu

2018 ◽  
Vol 131 ◽  
pp. 1156-1163 ◽  
Author(s):  
Tao Yang ◽  
Xu Xiangyang ◽  
Li Peng ◽  
Li Tonghui ◽  
Pan Leina

Author(s):  
Junbcom Hur ◽  
Younho Lee ◽  
Hyunsoo Yoon ◽  
Daeseon Choi ◽  
Seunghun Jin

2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Jingsha He ◽  
Jing Xu ◽  
Xingye Zhu ◽  
Yuqiang Zhang ◽  
Ting Zhang ◽  
...  

Location information of sensor nodes in wireless sensor networks (WSNs) is very important, for it makes information that is collected and reported by the sensor nodes spatially meaningful for applications. Since most current sensor localization schemes rely on location information that is provided by beacon nodes for the regular sensor nodes to locate themselves, the accuracy of localization depends on the accuracy of location information from the beacon nodes. Therefore, the security and reliability of the beacon nodes become critical in the localization of regular sensor nodes. In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. In our proposed scheme, the reputation of each beacon node is evaluated based on a reputation evaluation model so that regular sensor nodes can get credible location information from highly reputable beacon nodes to accomplish localization. We also perform a set of simulation experiments to demonstrate the effectiveness of the proposed reputation-based security scheme. And our simulation results show that the proposed security scheme can enhance the security and, hence, improve the accuracy of sensor localization in hostile or untrusted environments.


Sign in / Sign up

Export Citation Format

Share Document