English  |  正體中文  |  简体中文  |  Items with full text/Total items : 49983/85139 (59%)
Visitors : 7798401      Online Users : 98
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/98906


    Title: Protecting Participatory Sensing Using Cloud Based Trust Management System against Sybil Attack
    Authors: Shih-Hao Chang;Yeong-Sheng Chen;Naveen Chilamkurti;Seungmin Rho
    Contributors: 淡江大學資訊工程學系
    Keywords: Participatory sensing;Sybil attacks;Cloud Computing;Trust Management System
    Date: 2015
    Issue Date: 2014-09-25
    Publisher: New York: Hindawi Publishing Corporation
    Abstract: Participatory sensing is an innovative model in mobile sensing network which allows volunteers to collect and share information from their local environment by using mobile phones. Unlike other participatory sensing application challenges which consider user privacy and data trustworthiness, we consider the network trustworthiness problem, namely, Sybil attacks, in participatory sensing. A Sybil attack is defined as a malicious illegal presentation of multiple identities, called Sybil identities.These Sybil identities will intend to spread misinformation to reduce the effectiveness of sensing data in the participatory sensing network. To cope with this problem, a cloud based trust management scheme (CbTMS) framework was proposed to detect Sybil attacks in a participatory sensing network. The CbTMS was proffered for performing Sybil attack characteristic checks, in addition to a trustworthiness management system, to verify coverage nodes in participatory sensing. Simulation studies show that the proposed CbTMS can efficiently detect numerous defined malicious Sybil nodes with lower power consumption in the network.
    Relation: The Scientific World Journal 2014, 610989(9 pages)
    DOI: 10.1155/2014/610989
    Appears in Collections:[資訊工程學系暨研究所] 期刊論文

    Files in This Item:

    File Description SizeFormat
    610989_round_4.pdf2131KbAdobe PDF428View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback