scispace - formally typeset
Journal ArticleDOI

Reputation-based role assignment for role-based access control in wireless sensor networks

Sudip Misra, +1 more
- 01 Mar 2011 - 
- Vol. 34, Iss: 3, pp 281-294
Reads0
Chats0
TLDR
The main objective of this scheme is to manage reputation locally with minimum communication and delay overhead and to assign appropriate role or level to the deserved nodes in order to increase the throughput of overall network.
About: 
This article is published in Computer Communications.The article was published on 2011-03-01. It has received 69 citations till now. The article focuses on the topics: Key distribution in wireless sensor networks & Wireless network.

read more

Citations
More filters
Journal ArticleDOI

Wireless sensor networks for agriculture

TL;DR: The existing state-of-the-art in wireless sensor networks for agricultural applications is reviewed thoroughly and various case studies to thoroughly explore the existing solutions proposed in the literature in various categories according to their design and implementation related parameters.
Journal ArticleDOI

A Comprehensive Study of Security of Internet-of-Things

TL;DR: This survey attempts to provide a comprehensive list of vulnerabilities and countermeasures against them on the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (ii) communication, and (iii) edge computing.
Journal ArticleDOI

Review: The role of communication systems in smart grids: Architectures, technical solutions and research challenges

TL;DR: The fundamental research challenges in this field including communication reliability and timeliness, QoS support, data management services, and autonomic behaviors are introduced and the main solutions proposed in the literature for each are discussed.
Journal ArticleDOI

Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks

TL;DR: The proposed cooperative Game-based Fuzzy Q-learning (G-FQL) model implements cooperative defense counter-attack scenarios for the sink node and the base station to operate as rational decision-maker players through a game theory strategy, and yields a greater improvement than existing machine learning methods.
Journal ArticleDOI

Cluster-Based Consensus Time Synchronization for Wireless Sensor Networks

TL;DR: The simulation results show that the proposed algorithm reduces the communication traffic compared with the DCTS algorithm, and improves the convergence rate due to the combination of clustering topologies.
References
More filters
Journal ArticleDOI

A survey on sensor networks

TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI

The capacity of wireless networks

TL;DR: When n identical randomly located nodes, each capable of transmitting at W bits per second and using a fixed range, form a wireless network, the throughput /spl lambda/(n) obtainable by each node for a randomly chosen destination is /spl Theta/(W//spl radic/(nlogn)) bits persecond under a noninterference protocol.
Proceedings ArticleDOI

A key-management scheme for distributed sensor networks

TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Proceedings ArticleDOI

The Eigentrust algorithm for reputation management in P2P networks

TL;DR: An algorithm to decrease the number of downloads of inauthentic files in a peer-to-peer file-sharing network that assigns each peer a unique global trust value, based on the peer's history of uploads is described.
Proceedings ArticleDOI

Random key predistribution schemes for sensor networks

TL;DR: The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.
Related Papers (5)