Articles

Energy-Saving Reputation Method for Wireless Sensor Networks

Expand
  • (1. School of Computer Science, Civil Aviation Flight University of China, Guanghan 618307, Sichuan, China; 2. School of Computer Science, Sichuan University, Chengdu 610065, China)

Online published: 2012-05-31

Abstract

Reputation mechanism has been recently introduced into wireless sensor networks (WSNs) to overcome the deficiencies incurred by cryptography alone. Unlike most current reputation mechanisms that are based on binomial distribution and to some extent, do not give due attention to the aspect of energy constraint of WSNs, this research deduces and proves the feasibility that negative binomial distribution can well be used in the reputation update with distinctive energy-saving features. Comparison tests with respect to the energy consumption in terms of reputation computing frequencies are done between the traditional reputation method and the one in this study. Results show that our method can save more energy for the reputation update and thus can better meet the power constraints of WSNs.

Cite this article

WANG Fang 1 (王芳), WEI Zhe2 (魏哲) . Energy-Saving Reputation Method for Wireless Sensor Networks[J]. Journal of Shanghai Jiaotong University(Science), 2012 , 17(2) : 223 -227 . DOI: 10.1007/s12204-012-1256-2

References

[1] Zhong Y P, Kuang X H, Huang P W. Improved algorithm for distributed localization in wireless sensor networks [J]. Journal of Shanghai Jiaotong University

(Science), 2010, 15(1): 64-69.

[2] Xiao J F, Zeng G H. An improved ring signature scheme without trusted key generation center for wireless sensor network [J]. Journal of Shanghai Jiaotong

University (Science), 2009, 14(2): 189-194.

[3] Ozdemir S. Functional reputation based reliable data aggregation and transmission for wireless sensor networks [J]. Computer Communications, 2008, 31: 3941-

3953.

[4] Boukerche A, Ren Y. A trust-based security system for ubiquitous and pervasive computing environments [J]. Computer Communications, 2008, 31: 4343-4351.

[5] M´armol F G, P´erez G M. Security threats scenarios in trust and reputation models for distributed systems [J]. Computers & Security, 2009, 28: 545-556.

[6] Zouridaki C, Mark B L, Hejmo M, et al. E-hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks [J]. Ad Hoc Networks, 2009, 7:

1156-1168.

[7] Omar M, Challal Y, Bouabdallah A. Reliable and fully distributed trust model for mobile ad hoc networks [J]. Computers & Security, 2009, 28: 199-214.

[8] Mukherjee P, Sen S. Comparing reputation schemes for detecting malicious nodes in sensor networks [J].The Computer Journal, 2011, 54(3): 482-498.

[9] Zhao SK, HeD, LiWH, et al. Reputation-based collaborative spectrum sensing scheme in cognitive radio networks [J]. Journal of Shanghai Jiaotong University

Science), 2011, 16(6): 641-647.

[10] Ganeriwal S, Balzano L K, Srivastiva M B. Reputation-based framework for high integrity sensor networks [J]. ACM Transactions on Sensor Networks,

2008, 4(3): 15-37.

[11] Marmol F G, Perez G M. Towards prestandardization of trust and reputation model for distributed and heterogeneous systems [J]. Computer

Standards & Interfaces, 2010, 32: 185-196.

[12] Wang Fei, Wang Fu-rong, Huang Ben-xiong, et al. SONR: A reliable reputation system of self-organized network [J]. Journal of Network and Computer Applications,

2012, 35: 914-926.

[13] Casella G, Berger R L. Statistical inference [M]. California: Duxbury Press, 1990.

[14] Jøsang A, Ismail R. The beta reputation System [C]//Proceedings of the 15th Bled Conference on Electronic Commerce. Bled, Slovenia: [s.n.], 2002: 324-337
Options
Outlines

/