Abstract
In WSNs, security system based on password system from within the network attacks and to identify malicious nodes there is no effective treatment methods, trust-based security mechanisms have come into being, This paper discusses in detail the specific steps of trust node, proposed the node behavior evaluation mechanism based on the node trust, The paper has used ANP and the F-ANP method successively for the node behavior’s trust appraisal, and has carried on the contrast, finally obtains F-ANP more superior performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ren, F., Huang, H., Lin, C.: Wireless sensor network. Journal of Software 14(7), 1282–1291 (2003)
Wang, L.: Network analytic method (ANP) theory and algorithm. Systems Engineering Theory and Practice 3, 45–50 (2001)
Sun, H., Tian, P.: Network-level analysis and scientific decision-making. Decision science theories and methods, pp. 3–8. Ocean Press (2001)
Van Laarhoven, P.J.M., Pedrycz, W.A.: Fuzzy extension of Statty’s Priority theory. Fuzzy Sets and Systems 11, 229–241 (1983)
Guoxing, Z., Weisong, S., Julia, D.: A resilient trust model for WSNs. In: Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, Berkeley, California, USA, pp. 411–412 (November 2009)
Lin, C., Wang, Y., Tian, L.: Development of Trusted Network and Chanllenges It Faces. ZTE Communications 6(1), 13–17 (2008)
Tian, L.Q., Ni, Y., Lin, C.: Node Behavior Trust Evaluation Based on Behavior Evidence in WSNs. ICFCC V1, 312–317 (2010)
Boukerch, A., Xu, L., EL-Khatib, K.: Trust-based security for wireless ad hoc and sensor networks. Computer Communications 30, 2413–2427 (2007)
Saaty, T.L.: Decision making with the analytic hierarchy process. Services Sciences 1(1), 83–96 (2008)
Tian, L., Lin, C., Ji, T.: A Kind of Quantitative Evaluation of User Behaviour Trust Using AHP. Journal of Computational Information Systems 3, 412–420 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, Q. (2011). Study of WSNs Trust Valuation Based on Node Behavior. In: Liu, B., Chai, C. (eds) Information Computing and Applications. ICICA 2011. Lecture Notes in Computer Science, vol 7030. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25255-6_65
Download citation
DOI: https://doi.org/10.1007/978-3-642-25255-6_65
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25254-9
Online ISBN: 978-3-642-25255-6
eBook Packages: Computer ScienceComputer Science (R0)