Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
A Trust Model using Fuzzy Logic in Wireless Sensor Network
Authors: Tae Kyung Kim, Hee Suk Seo
Abstract:
Adapting various sensor devices to communicate within sensor networks empowers us by providing range of possibilities. The sensors in sensor networks need to know their measurable belief of trust for efficient and safe communication. In this paper, we suggested a trust model using fuzzy logic in sensor network. Trust is an aggregation of consensus given a set of past interaction among sensors. We applied our suggested model to sensor networks in order to show how trust mechanisms are involved in communicating algorithm to choose the proper path from source to destination.Keywords: Fuzzy, Sensor Networks, Trust.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1079192
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3559References:
[1] T. H. Hai, F. Khan, and E. Huh, "Hybrid Intrusion Detection System for Wireless Sensor Networks", ICCSA 2007, LNCS 4706.
[2] Wood, A.D., Stankovic, J.A. "Denial of Service in Sensor Networks", Computer 35(10), 2002.
[3] Karlof, C., Wagner, D. "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", Elsevier-s Ad. Hoc. Networks Journal, Special issue on sensor network applications and protocols, 2003.
[4] Sini Ruohomaa and Lea Kutvonen, "Trust Management Survey", iTrust 2005, LNCS 3477, 2005.
[5] Marsh, S., "Formalising Trust as a Computational Concept. PhD thesis", University of Stirling, Department of Computer Science and Mathematics, 1994.
[6] Mayer, R.C., Davis, J.H., "An integrative model of organizational trust:, The Academy of Management Review 20, 1995.
[7] Essin, D.J., "Patterns of trust and policy", Proceedings of 1997 New Security Paradigms Workshop, ACM Press 1997.
[8] Egger, F.N., "Trust me, I-m an online vendor: Towards a model of trust for e-Commerce system design", Conference on Human Factors in Computing Systems, ACM Press, 2000.
[9] Egger, F.N., "From Interactions to Transactions: Designing the Trust Experience for Business-to-Consumer Electronic Commerce", PhD thesis, Eindhoven University of Technology, 2003.
[10] Mui, L., Mohtashemi, M., Halberstadt, A., "A computational model of trust and reputation", 35th Annual Hawaii International Conference on System Sciences (HICSS-02). Volume 7., IEEE Computer Society, 2002.
[11] Liu, J., Issarny, V., "Enhanced reputation mechanism for mobile ad hoc networks", Trust Management: Second International Conference, iTrust 2004, Oxford, UK, March 29-April 1, 2004. Proceedings. Volume LNCS 2995, 2004.
[12] Wagealla, W., Carbone, M., English, C., Terzis, S., Nixon, P., "A formal model on trust lifecycle management", Workshop on Formal Aspects of Security and Trust (FAST2003) at FM2003. Volume IIT TR-10/2003. IIT-CNR, Italy, 2003.
[13] Cahill, V., et al., "Using trust for secure collaboration in uncertain environments", Pervasive Computing 2, 2003.
[14] Grandison, T., Sloman, M., "Specifying and analysing trust for Internet applications", Proceedings of 2nd IFIP Conference on e-Commerce, e-Business, e-Government I3e2002, Lisbon, Portugal, 2002.
[15] Grandison, T.W.A., Sloman, M., "Sultan - a language for trust specification and analysis", Eighth Workshop of the HP OpenView University Association, Berlin, June 24-27, 2001.
[16] English, C., Terzis, S., Wagealla, W., "Engineering trust based collaborations in a global computing environment", Trust Management: Second International Conference, iTrust 2004, LNCS 2995, 2004.
[17] Morgado de Gois, J. A., Germann, D., Hiller, M.,"Sensor-based ground detection in unstructured terrain for the walking machine ALDURO", 6th Conference on Climbing and Walking Robots CLAWAR 2003.
[18] Stephen Marsh and Mark R. Dibben, "Trust, Untrust, Distrust and Mistrust - An Exploration of the Dark(er) side", iTrust 2005, LNCS 3477, 2005.