2011 IEEE 3rd International Conference on Communication Software and Networks 2011
DOI: 10.1109/iccsn.2011.6014335
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving computation of trust-value in wireless sensor networks

Abstract: The traditional cryptographic mechanisms are not enough for wireless sensor networks (WSNs) when the control of sensor nodes are taken by an interior adversary. Trust manage ment system can solve this problem efficiently, and enhance the security and reliability of WSNs. One of the key problems in trust management system is computing trust values of nodes. However, previous works pay little attention to preserving data privacy during computing trust values. This paper focus on the problem that how to protect t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 22 publications
(21 reference statements)
0
3
0
Order By: Relevance
“…The performance comparison is provided in Table I. In [15], the protocol is constructed by the arithmetics operations, and then, the computational cost is lowest; however, this protocol has to employ a trusted agent to distribute the credentials, while it is generally preferred to avoid trusted third party in secure multiparty computation protocols. Compared with the protocols in the semi-honest model, the extra computation/communication costs are added by the proofs of knowledge.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…The performance comparison is provided in Table I. In [15], the protocol is constructed by the arithmetics operations, and then, the computational cost is lowest; however, this protocol has to employ a trusted agent to distribute the credentials, while it is generally preferred to avoid trusted third party in secure multiparty computation protocols. Compared with the protocols in the semi-honest model, the extra computation/communication costs are added by the proofs of knowledge.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Asharov et al [14] presented a fair and efficient secure multiparty computation with reputation systems. Yuan et al [15] proposed a privacy-preserving trust value computation protocol to protect the data privacy while computing trust values, but their protocol is secure in the semi-honest model. The advantage of this protocol is that it does not need any encryption or decryption operations, and the computation and communication overhead is reduced to O.n/, while resisting a collusion of up to n 1 malicious users.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation