نتایج جستجو برای: trust aggregation
تعداد نتایج: 124329 فیلتر نتایج به سال:
Trust and reputation systems are widely employed in WSNs in order to help decision making processes by assessing trustworthiness of sensor nodes in a data aggregation process. However, in unattended and hostile environments, some sophisticated malicious attacks such as collusion attacks can distort the computed trust scores and lead to low quality or deceptive services as well as to undermine t...
Security data aggregation plays an important role in reducing the amount of data transmission and prolonging the life of wireless sensor networks (WSN). When the security of the aggregation nodes is threatened, the networks can generate many aggregated data errors, leading to trouble in a security measure. In this paper, we propose an energy-efficient reliable trust-based data aggregation proto...
Adapting various sensor devices to communicate within sensor networks empowers us by providing range of possibilities. The sensors in sensor networks need to know their measurable belief of trust for efficient and safe communication. In this paper, we suggested a trust model using fuzzy logic in sensor network. Trust is an aggregation of consensus given a set of past interaction among sensors. ...
WSN is often deployed in unattended or even hostile environments. Therefore, providing security in WSN is a major requirement for acceptance and deployment of WSN. Furthermore, establishing trust in a clustered environment can provide numerous advantages. We proposed a light-weighted trust model which consider data aggregation and detailed the data in parameters to depend against attacks. With ...
Sensor nodes are often deployed in large numbers to monitor extended sensor fields. In such scenarios data aggregation plays a crucial role on summarizing data forwarded to base stations in sensor networks. As sensor networks are commonly deployed in open and unattended areas, they are vulnerable to physical tampering as well as remote attacks. Existing security techniques focus primarily on me...
Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the si...
Due to sensors storage capacity limit, communication bandwidth and computation ability WSN has some limitations. Due to this limited resources the amount of data transmission in network should be reduced. Data aggregation is new method for the above purpose. From the present algorithms for data aggregation the efficient is Iterative Filtering (IF) algorithm, which provides trust evaluation to t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید