Trust evaluation model for wireless sensor networks

Wireless sensor networks offer many beneficial applications in various fields. However, because sensor devices are limited in their resources and susceptible to a variety of novel attacks, even a few malicious adversaries can easily spread deceitful data and make the networks be in confusion without...

Full description

Saved in:
Bibliographic Details
Published inThe 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005 Vol. 1; pp. 491 - 496
Main Authors Hur, Junbcom, Lee, Younho, Yoon, Hyunsoo, Choi, Daeseon, Jin, Seunghun
Format Conference Proceeding
LanguageEnglish
Published IEEE 2005
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Wireless sensor networks offer many beneficial applications in various fields. However, because sensor devices are limited in their resources and susceptible to a variety of novel attacks, even a few malicious adversaries can easily spread deceitful data and make the networks be in confusion without great efforts. Therefore, it is essential to distinguish forged data of illegal nodes from innocent data of legal nodes in sensor networks. In this paper, to make resilient wireless sensor networks, we propose a trust evaluation model which can identify trustworthiness of sensor nodes in order to filter out malicious nodes' deceitful data
DOI:10.1109/ICACT.2005.245914