期刊文献+

Negative Binomial Distribution Based Reputation Direct Update for Wireless Sensor Networks

Negative Binomial Distribution Based Reputation Direct Update for Wireless Sensor Networks
下载PDF
导出
摘要 In the reputation modeling of wireless sensor networks(WSNs) many literatures have proposed creative reputation indirect update methods,such as reputation integration,discounting,aging to eliminate,and filtering malicious reputation information. However,few have discussed the reputation direct update. In this paper,based on sound statistical theories,a negative binominal distribution method in the reputation direct update for WSNs is proposed. Results show that the proposed method is more suitable and time-saving for the reputation update of the resource constraint WSNs and can improve the computation power efficiency as well. In the reputation modeling of wireless sensor networks(WSNs) many literatures have proposed creative reputation indirect update methods,such as reputation integration,discounting,aging to eliminate,and filtering malicious reputation information. However,few have discussed the reputation direct update. In this paper,based on sound statistical theories,a negative binominal distribution method in the reputation direct update for WSNs is proposed. Results show that the proposed method is more suitable and time-saving for the reputation update of the resource constraint WSNs and can improve the computation power efficiency as well.
出处 《Journal of Electronic Science and Technology》 CAS 2011年第2期161-166,共6页 电子科技学刊(英文版)
基金 supported by the National Natural Science Foundation of China under Grant No. 6107311
关键词 Beta distribution negative binomial distribution REPUTATION wireless sensor networks Beta distribution negative binomial distribution reputation wireless sensor networks
  • 相关文献

参考文献2

二级参考文献22

  • 1Josang A, Ismail R. The Beta Reputation System[C]//Proc. 15th Bled Electron. Commerce Conf. , Juru 2002.
  • 2Josang A. Artificial Reasoning with Subjective Logic[C]// Abhaya Nayak. Proc of the Second Australian Workshop on Commonsense Reasoning. Perth, 1997.
  • 3Jφsang A. Modeling Trust in Information Security[D]. Norwegian: Dept of Computer and Information Science, Norwegian University of Science and Technology, 1997.
  • 4http://www. dmgroup. org. cn/pptdown050322/yichangjiance. ppt # 269[EB/OL].
  • 5Saurabh Ganerwal, Laura K. Balzano. Reputation-Based Framework for High Integrity Sensor Networks[J]. ACM Transactions on Sensor Networks, September 2007,5 (4).
  • 6Josang A. An Algebra for Assessing Trust in Certification Chains[C]// Proc. Netw. Distrib. Syst. Security Syrup., 1999.
  • 7PERRIG A,SZEWCZYK R,WEN V,et al.SPINS:Security Protocols for Sensor Networks[J].Wireless Networks Journal,2002,8(5).
  • 8KARLOF C,SASTRY N,WAGNER D.TinySec:Link Layer Encryption for Tiny Devices[A].ACM SenSys[C].2004.
  • 9DENG J,HAN R,MISHRA S.The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks[C].Proceedings of IPSN[C].2003.
  • 10WATRO R,KONG D,CUTI SF,et al.TinyPK:Securing Sensor Networks with Public Key Technology[A].Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks[C].2004.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部