Skip to main content

Research on Trustworthy Sensor Network Based on Zigbee Technology

  • Conference paper
  • First Online:
Trustworthy Computing and Services (ISCTCS 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 426))

Included in the following conference series:

  • 1187 Accesses

Abstract

This article introduces a trustworthy sensor network construction scheme based on a trustworthy node selection method. With this scheme, sensor networks will be safer and more reliable. This sensor network is based on Zigbee technology and selects corresponding appropriate pattern of networking. The nodes of Zigbee sensor network will be chosen using a node credibility formula. According to the setting scenarios, the result of simulation will be shown. Through this article, sensor network will be more useful in future application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xu, X., Gao, Y., Zhang, W., Li, J.: Research on data transmission security tactics of Zigbee network based on IEEE 802.15.4. Net Info Secur. 6, 10–12 (2009)

    Google Scholar 

  2. Wang, C., Jia, X., Lin, Q.: Trust based secure routing algorithm for wireless sensor networks. J. Commun. 29(11), 105–112 (2008)

    Google Scholar 

  3. Ye, Q., Zhou, M.: A security authentication mechanism based on behavior trust in wireless sensor networks. Mod. Comput. 4, 10–15 (2010)

    Google Scholar 

  4. Zhou, G., Han, Z., Hu, N.: Analysis of the key agreement sheme of zigbee standard. Appl. Electron. Tech. 33(10), 61–69 (2007)

    Google Scholar 

  5. Kinney, P.: Zigbee technology: wireless control that simply works. In: Communications Design Conference, vol. 2 (2003)

    Google Scholar 

  6. Ren, X., Yu, H.: Study on security of Zigbee wireless sensor network. Chin. J. Sci. Instr. 28(12), 2132–2137 (2007)

    Google Scholar 

  7. Wang, J., Chen, Z., Deng, X.: Novel routing algorithm based on trustworthy core tree in WSN. Comput. Sci. 38(12) (2011)

    Google Scholar 

  8. IPPM: IP Performance Metrics

    Google Scholar 

  9. Liu, Y.: Trust Model for Wireless Sensor Networks Based on Hierarchical Trust Management. Taiyuan University of Technology, Taiyua (2012)

    Google Scholar 

  10. Liu, B., Chen, H., Wang, H., Kong, X.: A trusted security scheme of wireless sensor networks. Comput. Digital Eng. 41(7), 1129–1133 (2013)

    Google Scholar 

  11. Zhang, Q.: Research on Nodes Credibility Technology in Wireless Sensor Network Environment. Nanjing University of Posts and Telecommunications (2011)

    Google Scholar 

Download references

Acknowledgements

This paper is supported by The National Natural Science Foundation of China (Grant No.911180002), and 863 Program (Grant No. 2011AA01A204).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shuaisen Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, S., Bøegh, J., Yang, J. (2014). Research on Trustworthy Sensor Network Based on Zigbee Technology. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43908-1_25

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43907-4

  • Online ISBN: 978-3-662-43908-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics