Trust management in wireless sensor networks

51Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.

Abstract

Cryptography based security solutions are not enough for WSNs when there are attacks from interior, which are caused by compromised nodes. Trust management can deal with this problem efficiently, and enhance the security, reliability and impartiality of the system. This paper gives a detailed introduction to the characteristics, the taxonomy, and the design of the framework, the vulnerability analysis, the attack models and the countermeasures. Among which the design of the framework, including the trust factors, the computation models and the application of trust, is the core of a trust management system and is given a deep insight into. In the end, several typical trust management systems are introduced. A panoramic view and detailed analysis of current trust based systems in WSNs is given.

Cite

CITATION STYLE

APA

Jing, Q., Tang, L. Y., & Chen, Z. (2008). Trust management in wireless sensor networks. Ruan Jian Xue Bao/Journal of Software, 19(7), 1716–1730. https://doi.org/10.3724/SP.J.1001.2008.01716

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free