Probabilistic modelling and recursive bayesian estimation of trust in wireless sensor networks
نویسندگان
چکیده
Wireless Sensor Networks closely resemble a human behaviour model, in which a number of nodes that have just met are able to communicate with each other based on mutual trust levels developed over a period of time. WSNs are characterised by their performance of an additional function to the traditional functions of an ad-hoc network, which is monitoring events and reporting data and, as such, the sensed data represent the core component of trust-modelling in this research.
منابع مشابه
Probabilistic modelling and recursive bayesian estimation of trust in wireless sensor networks 381 Probabilistic modelling and recursive bayesian estimation of trust in wireless sensor networks
Wireless Sensor Networks closely resemble a human behaviour model, in which a number of nodes that have just met are able to communicate with each other based on mutual trust levels developed over a period of time. WSNs are characterised by their performance of an additional function to the traditional functions of an ad-hoc network, which is monitoring events and reporting data and, as such, t...
متن کاملRule-based joint fuzzy and probabilistic networks
One of the important challenges in Graphical models is the problem of dealing with the uncertainties in the problem. Among graphical networks, fuzzy cognitive map is only capable of modeling fuzzy uncertainty and the Bayesian network is only capable of modeling probabilistic uncertainty. In many real issues, we are faced with both fuzzy and probabilistic uncertainties. In these cases, the propo...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملTarget Tracking with Unknown Maneuvers Using Adaptive Parameter Estimation in Wireless Sensor Networks
Abstract- Tracking a target which is sensed by a collection of randomly deployed, limited-capacity, and short-ranged sensors is a tricky problem and, yet applicable to the empirical world. In this paper, this challenge has been addressed a by introducing a nested algorithm to track a maneuvering target entering the sensor field. In the proposed nested algorithm, different modules are to fulfill...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010