Fuzzy trust model for wireless sensor networks with intrusion tolerance

To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG Liang-min1, GUO Yuan-bo2, ZHAN Yong-zhao1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74645009/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537784880300032
author WANG Liang-min1
GUO Yuan-bo2
ZHAN Yong-zhao1
author_facet WANG Liang-min1
GUO Yuan-bo2
ZHAN Yong-zhao1
author_sort WANG Liang-min1
collection DOAJ
description To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation and the example were given to show the per-formances of using the model to detect or tolerate the insidious attacks.Finally,the package drop ration of the networks with the trust evaluation system was simulated and the comparison with the related work was discussed.
format Article
id doaj-art-54044f3856cd4f2abdfee0a08b77fd91
institution Kabale University
issn 1000-436X
language zho
publishDate 2010-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-54044f3856cd4f2abdfee0a08b77fd912025-01-14T08:23:57ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-0131374474645009Fuzzy trust model for wireless sensor networks with intrusion toleranceWANG Liang-min1GUO Yuan-bo2ZHAN Yong-zhao1To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation and the example were given to show the per-formances of using the model to detect or tolerate the insidious attacks.Finally,the package drop ration of the networks with the trust evaluation system was simulated and the comparison with the related work was discussed.http://www.joconline.com.cn/zh/article/74645009/wireless sensor networksintrusion tolerancetrust modelfuzzy trust
spellingShingle WANG Liang-min1
GUO Yuan-bo2
ZHAN Yong-zhao1
Fuzzy trust model for wireless sensor networks with intrusion tolerance
Tongxin xuebao
wireless sensor networks
intrusion tolerance
trust model
fuzzy trust
title Fuzzy trust model for wireless sensor networks with intrusion tolerance
title_full Fuzzy trust model for wireless sensor networks with intrusion tolerance
title_fullStr Fuzzy trust model for wireless sensor networks with intrusion tolerance
title_full_unstemmed Fuzzy trust model for wireless sensor networks with intrusion tolerance
title_short Fuzzy trust model for wireless sensor networks with intrusion tolerance
title_sort fuzzy trust model for wireless sensor networks with intrusion tolerance
topic wireless sensor networks
intrusion tolerance
trust model
fuzzy trust
url http://www.joconline.com.cn/zh/article/74645009/
work_keys_str_mv AT wangliangmin1 fuzzytrustmodelforwirelesssensornetworkswithintrusiontolerance
AT guoyuanbo2 fuzzytrustmodelforwirelesssensornetworkswithintrusiontolerance
AT zhanyongzhao1 fuzzytrustmodelforwirelesssensornetworkswithintrusiontolerance