Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lim, Jihun | - |
dc.contributor.author | Keum, Dooho | - |
dc.contributor.author | Ko, Young Bae | - |
dc.date.issued | 2020-01-12 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/36610 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85082007804&origin=inward | - |
dc.description.abstract | In this paper, we address an important issue of trust evaluation for tactical wireless sensor networks, where energy-hungry sensor nodes are deployed in harsh and hostile areas for the purpose of surveillance and reconnaissance. In particular, due to the limited resources of the node, it is of great importance to detect and isolate malicious nodes in an energy-efficient manner. Most of previous work adopt some proactive scanning method, requiring periodical exchange of control messages even in ordinary times and thus significant computational overhead for updating trust values per all nodes over the network. In order to provide more energy efficient evaluation method (while yet preventing any intelligent attacks such as selective forwarding and false positive problem attacks), we propose a novel cooperative trust evaluation scheme in which the initial trust level of nodes measured by ondemand trust rating approach is re-evaluated later on by a root or gateway node based on a pattern analysis. Through a preliminary simulation study using OPNET simulator, we compare our scheme to the existing work and prove that it can achieve the higher detection rate with much less energy consumption. | - |
dc.language.iso | eng | - |
dc.publisher | Association for Computing Machinery | - |
dc.subject.mesh | Computational overheads | - |
dc.subject.mesh | Energy-efficient evaluations | - |
dc.subject.mesh | Pattern analysis | - |
dc.subject.mesh | Selective forwarding | - |
dc.subject.mesh | Simulation studies | - |
dc.subject.mesh | Tactical network | - |
dc.subject.mesh | Trust evaluation | - |
dc.subject.mesh | Trust management | - |
dc.title | A cooperative trust evaluation scheme for tactical wireless sensor networks | - |
dc.type | Conference | - |
dc.citation.conferenceDate | 2020.1.12. ~ 2020.1.15. | - |
dc.citation.conferenceName | 3rd International Conference on Software Engineering and Information Management, ICSIM 2020 - and its Workshop 2020 the 3rd International Conference on Big Data and Smart Computing, ICBDSC 2020 | - |
dc.citation.edition | Proceedings of the 2020 3rd International Conference on Software Engineering and Information Management, ICSIM 2020 - Workshop 2020 the 3rd International Conference on Big Data and Smart Computing, ICBDSC 2020 | - |
dc.citation.endPage | 187 | - |
dc.citation.startPage | 183 | - |
dc.citation.title | ACM International Conference Proceeding Series | - |
dc.identifier.bibliographicCitation | ACM International Conference Proceeding Series, pp.183-187 | - |
dc.identifier.doi | 10.1145/3378936.3378943 | - |
dc.identifier.scopusid | 2-s2.0-85082007804 | - |
dc.identifier.url | http://portal.acm.org/ | - |
dc.subject.keyword | Pattern Analysis | - |
dc.subject.keyword | Tactical networks | - |
dc.subject.keyword | Trust Management | - |
dc.type.other | Conference Paper | - |
dc.description.isoa | false | - |
dc.subject.subarea | Software | - |
dc.subject.subarea | Human-Computer Interaction | - |
dc.subject.subarea | Computer Vision and Pattern Recognition | - |
dc.subject.subarea | Computer Networks and Communications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.