The Authentication Method In Wireless Sensor Network Based On Trust Model

被引:0
|
作者
Voitovych, Olesia [1 ]
Kupershtein, Leonid [1 ]
Shulyatitska, Olga [1 ]
Malyushytskyy, Viktor [1 ]
机构
[1] Vinnytsia Natl Tech Univ, Informat Secur Dept, Vinnytsia, Ukraine
关键词
wireless sensor networks; WSN; authentication method; security problem; trust model; trust center; USER AUTHENTICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Existing wireless sensor network are developing rapidly and soon will occupy a dominant place among the data collection and communication. The remote location of the sensors and automatic operation increases their vulnerability to outside intrusions and attacks. Because of out of constant sensor supply the providing of authentication is quite challenging whereas the best protocols is negotiated sensor capabilities. The method of sensor authentication in the wireless sensor networks, which is based on a model of trust, is proposed.
引用
收藏
页码:993 / 997
页数:5
相关论文
共 50 条
  • [1] A HIERARCHICAL TRUST MODEL BASED ON IDENTITY AUTHENTICATION IN WIRELESS SENSOR NETWORKS
    Chen, Lu
    Zhang, Tao
    Wang, Yufei
    2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 2: FUTURE COMMUNICATION AND NETWORKING, 2011, : 333 - 336
  • [2] Trust Based Authentication Mechanism in Wireless Sensor Networks
    Li, Ru-ping
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (01) : 58 - 63
  • [3] Trust Model Based on Changeable Sampling Frequency for Wireless Sensor Network
    Wang Na
    Liu DongQian
    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 13 - 16
  • [4] A Hierarchical Trust Model for Cluster-based Wireless Sensor Network
    Ma, Li
    Liu, Guangjie
    FOURTH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND INFORMATION SCIENCES (CCAIS 2015), 2015, : 337 - 342
  • [5] Wireless Sensor Network Technology Based on Security Trust Evaluation Model
    Zhu, Jinghua
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (04) : 211 - 226
  • [6] Routing in Wireless Sensor Network using Fuzzy based Trust Model
    Raje, Radhika A.
    Sakhare, Apeksha V.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 529 - 532
  • [7] Improved Cross Authentication Model Based on Threshold Method in Wireless Network
    Yang, Yatao
    Pan, Shaoming
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 86 - 86
  • [8] Research based on the trust value of wireless sensor network security evaluation model
    Sijiu, Wu, 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (08):
  • [9] Trust Based Data Gathering in Wireless Sensor Network
    Karthik, N.
    Ananthanarayana, V. S.
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (03) : 1697 - 1717
  • [10] Behavior-based trust in wireless sensor network
    Huang, L
    Li, L
    Tan, Q
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 214 - 223