The Authentication Method In Wireless Sensor Network Based On Trust Model

被引:0
|
作者
Voitovych, Olesia [1 ]
Kupershtein, Leonid [1 ]
Shulyatitska, Olga [1 ]
Malyushytskyy, Viktor [1 ]
机构
[1] Vinnytsia Natl Tech Univ, Informat Secur Dept, Vinnytsia, Ukraine
关键词
wireless sensor networks; WSN; authentication method; security problem; trust model; trust center; USER AUTHENTICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Existing wireless sensor network are developing rapidly and soon will occupy a dominant place among the data collection and communication. The remote location of the sensors and automatic operation increases their vulnerability to outside intrusions and attacks. Because of out of constant sensor supply the providing of authentication is quite challenging whereas the best protocols is negotiated sensor capabilities. The method of sensor authentication in the wireless sensor networks, which is based on a model of trust, is proposed.
引用
收藏
页码:993 / 997
页数:5
相关论文
共 50 条
  • [31] Ticket-based Authentication Protocol for Underwater Wireless Sensor Network
    Yun, Chae-Won
    Lee, Jae-Hoon
    Yi, Okyeon
    Park, Soo-Hyun
    2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 215 - 217
  • [32] Bilinear pair based authentication protocol for wireless medical sensor network
    Zhang Junsong
    Jiang Yongcong
    Gan Yong
    Zhang Qikun
    The Journal of China Universities of Posts and Telecommunications, 2018, 25 (02) : 28 - 38
  • [33] Bilinear pair based authentication protocol for wireless medical sensor network
    Junsong Z.
    Yongcong J.
    Yong G.
    Qikun Z.
    Junsong, Zhang (zhangjs2002@foxmail.com), 2018, Beijing University of Posts and Telecommunications (25): : 28 - 38
  • [34] The Application of Nash Equilibrium in Trust Model of Deterministic Wireless Sensor Network
    Yan, Liu
    2014 SECOND INTERNATIONAL CONFERENCE ON ENTERPRISE SYSTEMS (ES), 2014, : 284 - 288
  • [35] Research on trust model based on social network correlation degree analysis in wireless sensor networks
    Zhang, Le-Jun
    Deng, Xin
    Guo, Lin
    Zhang, Jian-Pei
    Yang, Jing
    Li, Hong-Bo
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2015, 44 (01): : 106 - 111
  • [36] A Wireless Mesh Network Authentication Method based on Identity Based Signature
    Liu Wenju
    Shang Yuzhen
    Wang Ze
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3026 - 3029
  • [37] A Novel Sensor Node Selection Method Based on Trust for Wireless Sensor Networks
    Han, Guangjie
    Choi, Deokjai
    Lim, Wontaek
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2397 - 2400
  • [38] A Reputation Model Based on Behavior Trust in Wireless Sensor Networks
    Zhou, Ming-Zheng
    Zhang, Yi
    Wang, Jun
    Zhao, Sen-Yan
    2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, : 189 - 194
  • [39] Agent-based trust model in Wireless Sensor Networks
    Chen, Haiguang
    Wu, Huafeng
    Zhou, Xi
    Gao, Chuanshan
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 119 - +
  • [40] Trust Model of Wireless Sensor Networks Based on Shannon Entropy
    Hu, Jun
    Guan, Chun
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2016, PT II, 2016, 10042 : 397 - 403