Algorithms for Mining Distance-Based Outliers in Large Datasets
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
Finding Intensional Knowledge of Distance-Based Outliers
VLDB '99 Proceedings of the 25th International Conference on Very Large Data Bases
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
Behavior-Based trust in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Management and applications of trust in Wireless Sensor Networks: A survey
Journal of Computer and System Sciences
Hi-index | 0.00 |
Because sensor networks(WSN) often deployed in a wicked and hostile environment, individual nodes of WSN could be easily compromised by the adversary. Once a node's cryptographic key is compromised, an attacker may completely impersonate it and introduce arbitrary false information into the network. Basic cryptographic mechanisms are often not effective in this situation. In this paper we developed the trust and reputation management scheme to secure network in cluster-based Sensor Networks. In the cluster, the surveillance node(SN) use watchdog mechanism to monitor the behavior of every cluster node(CN), maintain reputation for other nodes and use it to evaluate their trustworthiness. The cluster head(CH) finally computed the trust value, decide node revocation and select SN newly.