A Comprehensive Trust Model Based on Multi-factors for WSNs
نویسندگان
چکیده
منابع مشابه
Fuzzy-Based Trust Prediction Model for Routing in WSNs
The cooperative nature of multihop wireless sensor networks (WSNs) makes it vulnerable to varied types of attacks. The sensitive application environments and resource constraints of WSNs mandate the requirement of lightweight security scheme. The earlier security solutions were based on historical behavior of neighbor but the security can be enhanced by predicting the future behavior of the nod...
متن کاملmortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولA Comprehensive Model for Identifying and Explaining Factors Affecting Burnout
Thisstudy provided a comprehensive model for identifying and explaining factors affecting burnout of faculty members. In this study, a descriptive-exploratory method with in-depth interviews were used. It was an applied, quantitative and non-experimental research. The instrument was a researcher-made questionnaire whose items were identified based on the review of secondary sources as well as ...
متن کاملA Fuzzy-based Trust Management in WSNs
Wireless sensor networks (WSNs) are composed of a large number of sensor nodes that are selforganized. The open nature of WSNs makes them easily exposed to a variety of attacks and brings many security challenges. Furthermore, because of the potentially dynamic behavior of WSNs, there is hardly any infrastructure or centralized control. To enhance the security in WSNs, it is necessary to evalua...
متن کاملA Genetic Programming-based trust model for P2P Networks
Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computers Communications & Control
سال: 2005
ISSN: 1841-9836,1841-9836
DOI: 10.15837/ijccc.2015.2.1756