Fuzzy trust model for wireless sensor networks with intrusion tolerance
To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2010-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74645009/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537784880300032 |
---|---|
author | WANG Liang-min1 GUO Yuan-bo2 ZHAN Yong-zhao1 |
author_facet | WANG Liang-min1 GUO Yuan-bo2 ZHAN Yong-zhao1 |
author_sort | WANG Liang-min1 |
collection | DOAJ |
description | To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation and the example were given to show the per-formances of using the model to detect or tolerate the insidious attacks.Finally,the package drop ration of the networks with the trust evaluation system was simulated and the comparison with the related work was discussed. |
format | Article |
id | doaj-art-54044f3856cd4f2abdfee0a08b77fd91 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2010-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-54044f3856cd4f2abdfee0a08b77fd912025-01-14T08:23:57ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-0131374474645009Fuzzy trust model for wireless sensor networks with intrusion toleranceWANG Liang-min1GUO Yuan-bo2ZHAN Yong-zhao1To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation and the example were given to show the per-formances of using the model to detect or tolerate the insidious attacks.Finally,the package drop ration of the networks with the trust evaluation system was simulated and the comparison with the related work was discussed.http://www.joconline.com.cn/zh/article/74645009/wireless sensor networksintrusion tolerancetrust modelfuzzy trust |
spellingShingle | WANG Liang-min1 GUO Yuan-bo2 ZHAN Yong-zhao1 Fuzzy trust model for wireless sensor networks with intrusion tolerance Tongxin xuebao wireless sensor networks intrusion tolerance trust model fuzzy trust |
title | Fuzzy trust model for wireless sensor networks with intrusion tolerance |
title_full | Fuzzy trust model for wireless sensor networks with intrusion tolerance |
title_fullStr | Fuzzy trust model for wireless sensor networks with intrusion tolerance |
title_full_unstemmed | Fuzzy trust model for wireless sensor networks with intrusion tolerance |
title_short | Fuzzy trust model for wireless sensor networks with intrusion tolerance |
title_sort | fuzzy trust model for wireless sensor networks with intrusion tolerance |
topic | wireless sensor networks intrusion tolerance trust model fuzzy trust |
url | http://www.joconline.com.cn/zh/article/74645009/ |
work_keys_str_mv | AT wangliangmin1 fuzzytrustmodelforwirelesssensornetworkswithintrusiontolerance AT guoyuanbo2 fuzzytrustmodelforwirelesssensornetworkswithintrusiontolerance AT zhanyongzhao1 fuzzytrustmodelforwirelesssensornetworkswithintrusiontolerance |