• Corpus ID: 15259118

A Trust Model using Fuzzy Logic in Wireless Sensor Network

@article{Kim2008ATM,
  title={A Trust Model using Fuzzy Logic in Wireless Sensor Network},
  author={Tae Kyung Kim and Hee Suk Seo},
  journal={World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering},
  year={2008},
  volume={2},
  pages={1051-1054}
}
  • Tae Kyung Kim, H. Seo
  • Published 21 June 2008
  • Computer Science
  • World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering
Adapting various sensor devices to communicate within sensor networks empowers us by providing range of possibilities. The sensors in sensor networks need to know their measurable belief of trust for efficient and safe communication. In this paper, we suggested a trust model using fuzzy logic in sensor network. Trust is an aggregation of consensus given a set of past interaction among sensors. We applied our suggested model to sensor networks in order to show how trust mechanisms are involved… 

Figures and Tables from this paper

Review of Trust Models in Wireless Sensor Networks

TLDR
The kinds of trust model, trust metrics used to address attacks by monitoring certain behavior of network, and existing trust models used in various decision making process of wireless sensor networks are discussed.

Survey of Various Trust Models and Their Behavior in Wireless Sensor Networks

TLDR
The general structure, design issues, trust metrics and the corresponding attacks and defense mechanisms of trust model are discussed and various trust models used in decision making process of Wireless Sensor Networks are discussed.

Evaluation of Hybrid Trust Models Using Ant Colony Optimization in Wireless Sensor Networks

TLDR
A brief survey on application of Ant Colony Optimization (ACO) and significance of trust models in WSNs and the performance of three hybrid trust models is evaluated.

Enhanced Beta Trust Model in wireless sensor networks

TLDR
Enhanced Beta Trust Model (EBTM) is planned to discover malicious attack in wireless sensor network and recovery procedure is integrated to improve the throughput of network.

A Trust-based Security Approach in Hierarchical Wireless Sensor Networks

TLDR
Simulation results show that proposed system has been able to greatly improve security and prevent untrusted and malicious nodes from becoming the cluster head.

Trust Based Misbehavior Detection in Wireless Sensor Networks

TLDR
This paper proposed a behavior based distributed trust model for wireless sensor network to effectively deal with self-ish or malicious nodes and takes multidimensional trust attributes derived from communications and networks to evaluate the overall trust of sensor nodes.

Trust and reputation in Wireless Sensors networks

TLDR
The attacks that the wireless sensor networks may suffer from and trust models in these networks are listed and the immunity of the trust models from the malicious attacks is shown.

Improved Trust System for Clustered Wireless Sensor Network

TLDR
In this work, Improved Trust System (ITS) is proposed for clustered WSNs and theory as well as simulation results show that ITS demands less memory and communication overhead as compared with other typical trust systems and is more suitable for clusteredWSNs.

Reputation-based trust management in wireless sensor networks

  • T. Zia
  • Computer Science
    2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing
  • 2008
TLDR
The reputation and trust management and setting a scene to integrate the trust in a security framework to ensure the reliability, integrity and trustworthiness of data sensed by the sensor nodes is studied.

Trust and Reputation Based Collaborating Computing in Wireless Sensor Networks

  • A. Ukil
  • Computer Science
    2010 Second International Conference on Computational Intelligence, Modelling and Simulation
  • 2010
TLDR
A trust and reputation based collaborating computing model is derived which effectively eliminates the malicious behavior of rogue nodes with high probability and is shown to be very much robust and secure.
...

References

SHOWING 1-10 OF 21 REFERENCES

Secure routing in wireless sensor networks: attacks and countermeasures

  • Chris KarlofD. Wagner
  • Computer Science
    Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
  • 2003
TLDR
This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.

Enhanced Reputation Mechanism for Mobile Ad Hoc Networks

TLDR
A reputation model is presented, which incorporates two essential dimensions, time and context, along with mechanisms supporting reputation formation, evolution and propagation, and introduces the notion of recommendation reputation, which shows effectiveness in distinguishing truth-telling and lying agents, obtaining true reputation of an agent, and ensuring reliability against attacks of defame and collusion.

Engineering Trust Based Collaborations in a Global Computing Environment

TLDR
This paper focuses on the relationship between trust and risk, and explores alternative views of this relationship, and exemplifies how particular views can be exploited in two particular application scenarios.

Hybrid Intrusion Detection System for Wireless Sensor Networks

TLDR
A hybrid, lightweight intrusion detection system integrated for sensor networks that take advantage of cluster-based protocol to build a hierarchical network and provide an intrusion framework based both on anomaly and misuse techniques that can prevent most of routing attacks on sensor networks.

Trust Management Survey

TLDR
A general overview of the state of the art is provided, combined with examples of things to take into consideration both when modelling trust in general and building a solution for a certain phase in trust management.

Specifying and Analysing Trust for Internet Applications

TLDR
SULTAN (Simple Universal Logic-oriented Trust Analysis Notation) is an abstract, logic-oriented notation designed to facilitate the specification and analysis of trust relationships.

Denial of Service in Sensor Networks

TLDR
To identify denial-of-service vulnerabilities, the authors analyzed two effective sensor network protocols that did not initially consider security and demonstrate that consideration of security at design time is the best way to ensure successful network deployment.

A formal model of trust lifecycle management

TLDR
This paper provides an approach for formalizing the dynamic aspects of trust lifecycle with a consideration of trust formation, exploitation, and evolution and introduces a notion of attraction to model the effect of new pieces of evidence on the opinion.

Using Trust for Secure Collaboration in Uncertain Environments

The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial

Formalising Trust as a Computational Concept

TLDR
The thesis presents a testbed populated by simple trusting agents which substantiates the utility of the formalism and provides a step in the direction of a proper understanding and definition of human trust.