DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Yoon, Hyun-Soo | - |
dc.contributor.advisor | 윤현수 | - |
dc.contributor.author | Hur, Jun-Beom | - |
dc.contributor.author | 허준범 | - |
dc.date.accessioned | 2011-12-13T06:05:21Z | - |
dc.date.available | 2011-12-13T06:05:21Z | - |
dc.date.issued | 2005 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=249535&flag=dissertation | - |
dc.identifier.uri | http://hdl.handle.net/10203/34683 | - |
dc.description | 학위논문(석사) - 한국과학기술원 : 전산학전공, 2005.8, [ vi, 45 p. ] | - |
dc.description.abstract | Wireless sensor networks offer many kinds of beneficial solutions in various fields such as ocean and wildlife monitoring, people``s heart rates monitoring in medical application, environmental disasters monitoring, and many other military applications. A major feature of wireless sensor networks is infrastructure-less, so each sensor node of the network assists each other and controls packets from one node to another. Above all, because wireless sensor networks are often deployed in open environment and interact closely with their physical environments and people, the sensor networks are likely to be susceptible to their unexpected physical environments and intentional attacks from some adversaries. In addition, sensor devices are limited in their resources and vulnerable to a node capture attack, so even a few malicious adversaries can easily compromise sensor devices, extract cryptographic secrets from them, or inject forged data into the networks to make the networks be in confusion. Because of these unique challenges of wireless sensor networks, traditional security techniques used in conventional networks cannot be applied directly to wireless sensor networks. Several conventional cryptographic approaches such as key management and authentication schemes can support wireless sensor networks to purge false data injected from malicious outsiders. However, such conventional cryptographic approaches cannot prevent the injection of false data from compromised insider nodes which have already been authenticated as legal ones in the networks. Once authenticated as a legitimate node, broadcasting data from that node cannot help being accepted as trustful data in the networks without any question. Therefore, a novel trust management scheme is necessary to distinguish illegal nodes from legal ones, and filter out malicious nodes`` deceitful data in the wireless sensor networks. In this paper, to make resilient wireless sensor networks, we propose a trust evaluation... | eng |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | security | - |
dc.subject | sensor networks | - |
dc.subject | Trust management | - |
dc.subject | data aggregation | - |
dc.subject | 데이터통합 | - |
dc.subject | 신뢰관리 | - |
dc.subject | 보안 | - |
dc.subject | 센서 네트워크 | - |
dc.title | Trust evaluation model for wireless sensor networks | - |
dc.title.alternative | 무선 센서 네트워크에서의 신뢰평가 모델 | - |
dc.type | Thesis(Master) | - |
dc.identifier.CNRN | 249535/325007 | - |
dc.description.department | 한국과학기술원 : 전산학전공, | - |
dc.identifier.uid | 020013642 | - |
dc.contributor.localauthor | Yoon, Hyun-Soo | - |
dc.contributor.localauthor | 윤현수 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.