Trust evaluation model for wireless sensor networks

Junbeom Hurt, Younho Lee, Hyunsoo Yoont, Daeseon Choi, Seunghun Jin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

73 Scopus citations

Abstract

Wireless sensor networks offer many beneficial applications in various fields. However, because sensor devices are limited in their resources and susceptible to a variety of novel attacks, even a few malicious adversaries can easily spread deceitful data and make the networks be in confusion without great efforts. Therefore, it is essential to distinguish forged data of illegal nodes from innocent data of legal nodes in sensor networks. In this paper, to make resilient wireless sensor networks, we propose a trust evaluation model which can identify trustworthiness of sensor nodes in order to filter out malicious nodes' deceitful data.

Original languageEnglish
Title of host publicationThe 7th International Conference on Advanced Communication Technology, ICACT 2005
Pages491-496
Number of pages6
StatePublished - 2005
Event7th International Conference on Advanced Communication Technology, ICACT 2005 - Phoenix Park, Korea, Republic of
Duration: 21 Feb 200523 Feb 2005

Publication series

NameThe 7th International Conference on Advanced Communication Technology, ICACT 2005
Volume1

Conference

Conference7th International Conference on Advanced Communication Technology, ICACT 2005
Country/TerritoryKorea, Republic of
CityPhoenix Park
Period21/02/0523/02/05

Keywords

  • Security
  • Sensor network
  • Trust evaluation

Fingerprint

Dive into the research topics of 'Trust evaluation model for wireless sensor networks'. Together they form a unique fingerprint.

Cite this