Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lim, Jihun | - |
dc.contributor.author | Ko, Young Bae | - |
dc.contributor.author | Kim, Dohyung | - |
dc.contributor.author | Kim, Dabin | - |
dc.date.issued | 2018-11-16 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/36286 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85059471592&origin=inward | - |
dc.description.abstract | In this paper, we address the trust management issue in a military IoT networks where nodes are deployed in harsh and hostile area and communicates. In particular, due to the limited resources of the node, it is of great importance to detect and isolate malicious nodes in an energy-efficient way. Most previous work adopts proactive scanning method that periodically exchanges control messages and does computation for updating trust values over the network, which may incur a waste of energy when no attack is being launched in the network. Here, we present an stepwise approach trust evaluation method using a tree structured routing, in which 1) the trust evaluation process is triggered by nodes only when they sense a suspicious behavior of their child nodes; 2) The evaluation process consists of two phases: querying to its parent node, and local computation of the trust value; Via simulation study using OPNET simulator, it is proven that compared to the existing work, the proposed scheme could achieve the same level of security with much less energy consumption. | - |
dc.description.sponsorship | ACKNOWLEDGMENT This work has been supported by the Future Combat System Network Technology Research Center program of Defense Acquisition Program Administration and Agency for Defense Development (UD160070BD) | - |
dc.language.iso | eng | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.subject.mesh | Local computation | - |
dc.subject.mesh | Military IoT | - |
dc.subject.mesh | Multihop wireless network | - |
dc.subject.mesh | Opnet | - |
dc.subject.mesh | Simulation studies | - |
dc.subject.mesh | Stepwise approach | - |
dc.subject.mesh | Trust evaluation | - |
dc.subject.mesh | Trust management | - |
dc.title | A Stepwise Approach for Energy Efficient Trust Evaluation in Military IoT Networks | - |
dc.type | Conference | - |
dc.citation.conferenceDate | 2018.10.17. ~ 2018.10.19. | - |
dc.citation.conferenceName | 9th International Conference on Information and Communication Technology Convergence, ICTC 2018 | - |
dc.citation.edition | 9th International Conference on Information and Communication Technology Convergence: ICT Convergence Powered by Smart Intelligence, ICTC 2018 | - |
dc.citation.endPage | 692 | - |
dc.citation.startPage | 689 | - |
dc.citation.title | 9th International Conference on Information and Communication Technology Convergence: ICT Convergence Powered by Smart Intelligence, ICTC 2018 | - |
dc.identifier.bibliographicCitation | 9th International Conference on Information and Communication Technology Convergence: ICT Convergence Powered by Smart Intelligence, ICTC 2018, pp.689-692 | - |
dc.identifier.doi | 10.1109/ictc.2018.8539353 | - |
dc.identifier.scopusid | 2-s2.0-85059471592 | - |
dc.identifier.url | http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8509497 | - |
dc.subject.keyword | Military IoT | - |
dc.subject.keyword | Multi-hop Wireless Networks | - |
dc.subject.keyword | Opnet | - |
dc.subject.keyword | Stepwise Approach Trust Evaluation | - |
dc.type.other | Conference Paper | - |
dc.description.isoa | false | - |
dc.subject.subarea | Computer Networks and Communications | - |
dc.subject.subarea | Computer Science Applications | - |
dc.subject.subarea | Information Systems | - |
dc.subject.subarea | Information Systems and Management | - |
dc.subject.subarea | Artificial Intelligence | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.