Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2014, Article ID 649392, 10 pages
http://dx.doi.org/10.1155/2014/649392
Research Article

BeTrust: A Dynamic Trust Model Based on Bayesian Inference and Tsallis Entropy for Medical Sensor Networks

Yan Gao1,2 and Wenfen Liu1,2

1Zhengzhou Institute of Information Science and Technology, Zhengzhou 450002, China
2State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China

Received 24 July 2014; Revised 11 November 2014; Accepted 11 November 2014; Published 3 December 2014

Academic Editor: Romeo Bernini

Copyright © 2014 Yan Gao and Wenfen Liu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. Patil and A. Mulla, “Medical application based on wireless sensor network,” International Journal of Computer Science and Communication Engineering, vol. 2, no. 2, pp. 43–46, 2013. View at Google Scholar
  2. R. D. Caytiles and S. Park, “A study of the design of wireless medical sensor network based u-healthcare system,” International Journal of Bio-Science and Bio-Technology, vol. 6, no. 3, pp. 91–96, 2014. View at Google Scholar
  3. A. Darwish and A. E. Hassanien, “Wearable and implantable wireless sensor network solutions for healthcare monitoring,” Sensors, vol. 11, no. 6, pp. 5561–5595, 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. P. Kumar and H.-J. Lee, “Security issues in healthcare applications using wireless medical sensor networks: a survey,” Sensors, vol. 12, no. 1, pp. 55–91, 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. P. Kumar, S.-G. Lee, and H.-J. Lee, “E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks,” Sensors, vol. 12, no. 2, pp. 1625–1647, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. K. S. Barber and J. Kim, “Soft security: isolating unreliable agents from society,” in Trust, Reputation, and Security: Theories and Practice, pp. 224–233, Springer, Berlin, Germany, 2003. View at Google Scholar
  7. A. Boukerche and Y. L. Ren, “A secure mobile healthcare system using trust-based multicast scheme,” IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 387–399, 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. D. He, C. Chen, S. Chan, J. Bu, and A. V. Vasilakos, “A distributed trust evaluation model and its application scenarios for medical sensor networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 6, pp. 1164–1175, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. D. He, C. Chen, S. Chan, J. Bu, and A. V. Vasilakos, “ReTrust: attack-resistant and lightweight trust management for medical sensor networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 4, pp. 623–632, 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Y. Lee, W. C. Lin, and Y. H. Huang, “A lightweight authentication protocol for internet of things,” in Proceedings of the International Symposium on Next-Generation Electronics, pp. 1–2, Kwei-Shan Tao-Yuan, Taiwan, May 2014.
  11. J. O. Berger, Statistical Decision Theory and Bayesian Analysis, Springer, 2nd edition, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  12. R. R. Yager and D. P. Filev, “Induced ordered weighted averaging operators,” IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics, vol. 29, no. 2, pp. 141–150, 1999. View at Publisher · View at Google Scholar · View at Scopus
  13. C. Tsallis, “Possible generalization of Boltzmann-Gibbs statistics,” Journal of Statistical Physics, vol. 52, no. 1-2, pp. 479–487, 1988. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus