A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value

The sensor is quite easily attacked or invaded during the process of the node coverage optimization. It is a great challenge to make sure that the wireless sensor network could still carry out a secure communication and reliable coverage under the condition of being attacked. Therefore, this paper p...

Full description

Bibliographic Details
Main Authors: Zuo Chen, Xue Li, Bing Yang, Qian Zhang
Format: Article
Language:English
Published: Hindawi Limited 2015-01-01
Series:Journal of Sensors
Online Access:http://dx.doi.org/10.1155/2015/430456
id doaj-953c8172885a4f6593437505cd465c93
record_format Article
spelling doaj-953c8172885a4f6593437505cd465c932020-11-24T22:01:27ZengHindawi LimitedJournal of Sensors1687-725X1687-72682015-01-01201510.1155/2015/430456430456A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust ValueZuo Chen0Xue Li1Bing Yang2Qian Zhang3College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan 410082, ChinaCollege of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan 410082, ChinaSchool of Education, Hubei University, Wuhan, Hubei 430062, ChinaCollege of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan 410082, ChinaThe sensor is quite easily attacked or invaded during the process of the node coverage optimization. It is a great challenge to make sure that the wireless sensor network could still carry out a secure communication and reliable coverage under the condition of being attacked. Therefore, this paper proposes a network coverage method for intrusion tolerance based on trust value of nodes by combining the trust value model with the reliable coverage optimization. It first estimates trust value of nodes through which to regulate the perception radius and decision-making radius. Furthermore, this algorithm also combines the classical methods of wireless network coverage, such as GSO and PSO, to realize the networks coverage of invasive tolerant sensor. After comparing with the conventional single cover mechanism, it can improve the security and coverage rate of network under the condition of invasion. The simulation results verify the effectiveness of the algorithm.http://dx.doi.org/10.1155/2015/430456
collection DOAJ
language English
format Article
sources DOAJ
author Zuo Chen
Xue Li
Bing Yang
Qian Zhang
spellingShingle Zuo Chen
Xue Li
Bing Yang
Qian Zhang
A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value
Journal of Sensors
author_facet Zuo Chen
Xue Li
Bing Yang
Qian Zhang
author_sort Zuo Chen
title A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value
title_short A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value
title_full A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value
title_fullStr A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value
title_full_unstemmed A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value
title_sort self-adaptive wireless sensor network coverage method for intrusion tolerance based on trust value
publisher Hindawi Limited
series Journal of Sensors
issn 1687-725X
1687-7268
publishDate 2015-01-01
description The sensor is quite easily attacked or invaded during the process of the node coverage optimization. It is a great challenge to make sure that the wireless sensor network could still carry out a secure communication and reliable coverage under the condition of being attacked. Therefore, this paper proposes a network coverage method for intrusion tolerance based on trust value of nodes by combining the trust value model with the reliable coverage optimization. It first estimates trust value of nodes through which to regulate the perception radius and decision-making radius. Furthermore, this algorithm also combines the classical methods of wireless network coverage, such as GSO and PSO, to realize the networks coverage of invasive tolerant sensor. After comparing with the conventional single cover mechanism, it can improve the security and coverage rate of network under the condition of invasion. The simulation results verify the effectiveness of the algorithm.
url http://dx.doi.org/10.1155/2015/430456
work_keys_str_mv AT zuochen aselfadaptivewirelesssensornetworkcoveragemethodforintrusiontolerancebasedontrustvalue
AT xueli aselfadaptivewirelesssensornetworkcoveragemethodforintrusiontolerancebasedontrustvalue
AT bingyang aselfadaptivewirelesssensornetworkcoveragemethodforintrusiontolerancebasedontrustvalue
AT qianzhang aselfadaptivewirelesssensornetworkcoveragemethodforintrusiontolerancebasedontrustvalue
AT zuochen selfadaptivewirelesssensornetworkcoveragemethodforintrusiontolerancebasedontrustvalue
AT xueli selfadaptivewirelesssensornetworkcoveragemethodforintrusiontolerancebasedontrustvalue
AT bingyang selfadaptivewirelesssensornetworkcoveragemethodforintrusiontolerancebasedontrustvalue
AT qianzhang selfadaptivewirelesssensornetworkcoveragemethodforintrusiontolerancebasedontrustvalue
_version_ 1725839448124424192