资源描述:
《providing trust in wireless sensor network using a bio-inspired techniquey》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、TelecommunSystDOI10.1007/s11235-010-9281-7Providingtrustinwirelesssensornetworksusingabio-inspiredtechniqueFélixGómezMármol·GregorioMartínezPérez©SpringerScience+BusinessMedia,LLC2010AbstractWirelessSensorNetworks(WSNs)arebecomingwellashighrestrictionsofcomputing,memoryande
2、nergymoreandmorespreadandbothindustryandacademiaarecapabilities.focusingtheirresearcheffortsinordertoimprovetheirap-WSNsareusuallycomposedofalargenumberoftheseplications.Oneofthefirstissuestosolveinordertoachievenodeswhich,togetherwiththeirhighlydynamictopology,thatexpectedi
3、mprovementistoassureaminimumlevelofmayleadtosomescalabilityproblems.securityinsucharestrictiveenvironment.Evenmore,en-Anumberofresearchgroupsareworkingonthemsincesuringconfidencebetweeneverypairofinteractingnodesisthiskindofnetworkshasseveralinterestingapplicationsacriticali
4、ssueinthiskindofnetworks.Underthesecondi-rangingfrommilitaryonestoenvironmentalones,passingtionswepresentinthispaperabio-inspiredtrustandrepu-throughsanitaryapplications,domotics,IntelligentTrans-tationmodel,calledBTRM-WSN,basedonantcolonysys-portationSystems(ITS)[2],etc.te
5、msaimingatprovidingtrustandreputationinWSNs.Ex-However,duetotheirimportantrestrictions,theyusuallyperimentsandresultsdemonstratetheaccuracy,robustnesssufferfrommanysecurityweaknesses,whichmakethemandlightnessoftheproposedmodelinawidesetofsitua-oftenvulnerabletocertainthreat
6、s.Hardwarefailurescouldtions.beasourceofwrongcriticalinformationspreading,forin-stance.Butevenmore,nodesbelongingtoaWSNcouldKeywordsTrust&reputationmanagement·Wirelessmisbehavewhentheyareaskedforameasurement,orsomesensornetworks·Bio-inspiredalgorithmsdata.Withoutlossofgener
7、ality,wewilladopttheschemewheresomenodesofthenetworkrequestsomeservices1Introduction(andact,therefore,asclients)andsomeothersprovidethoseservices(thusactingasserversorservicesproviders).InWSNs[1]arenetworksbasedonsmallsizenodescoopera-suchascenario,anodecouldprovideafraudul
8、entservicetion.Thosenodesaremainlycharacterizedbytheirlowen-whenthisisrequested.er