Node-Level Trust Evaluation in Wireless Sensor Networks

被引:28
|
作者
Desai, S. Sundeep [1 ]
Nene, Manisha J. [1 ]
机构
[1] Def Inst Adv Technol, Dept Comp Sci & Engn, Pune 411025, Maharashtra, India
关键词
Security; trust; trust evaluation algorithms; cryptography; node-level security; node-memory integrity; AD HOC; MANAGEMENT; SECURITY; ATTACKS; SYSTEMS; SERVICE;
D O I
10.1109/TIFS.2019.2894027
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional cryptographic methods do not cater to the limitations of wireless sensor networks (WSNs) primarily concerning code size, processing time, and power consumption. The study in this paper enumerates the security primitives in WSNs and accentuates the strength of trust evaluation as a security solution within the WSN precincts. This paper proposes a trust evaluation methodology that evaluates a node-level trust by using an internal resource of a node. It is a completely mediating technique which is independent of network topology and second-hand information. The challenge response method enables a node to evaluate trust for itself; and with its peer-node/s with which it intends to interact using the proposed self-scrutiny and self-attestation algorithms, respectively. The efficacy of the proposed software-based methodology and the algorithms is demonstrated with the actual implementation on sensor nodes. The ability to counter attack-scenarios along with the analysis exhibits the merit of the proposed work. The average values of the observed results illustrate the consistency and robust performance of the proposed trust evaluation algorithms.
引用
收藏
页码:2139 / 2152
页数:14
相关论文
共 50 条
  • [1] A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks
    Basan, Alexander
    Basan, Elena
    Makarevich, Oleg
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 369 - 372
  • [2] Comparative study of trust and reputation systems for wireless sensor networks
    Khalid, Osman
    Khan, Samee U.
    Madani, Sajjad A.
    Hayat, Khizar
    Khan, Majid I.
    Min-Allah, Nasro
    Kolodziej, Joanna
    Wang, Lizhe
    Zeadally, Sherali
    Chen, Dan
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (06) : 669 - 688
  • [3] Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks
    Prabha, V. Ram
    Latha, P.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2017, 42 (02): : 143 - 151
  • [4] Trust evaluation model for wireless sensor networks
    Hur, J
    Lee, Y
    Yoon, H
    Choi, D
    Jin, S
    7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 491 - 496
  • [5] Towards comparative evaluation of trust and reputation models over static, dynamic and oscillating wireless sensor networks
    Verma, Vinod Kumar
    Singh, Surinder
    Pathak, N. P.
    WIRELESS NETWORKS, 2017, 23 (02) : 335 - 343
  • [6] BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks
    Anwar, Raja Waseem
    Zainal, Anazida
    Outay, Fatma
    Yasar, Ansar
    Iqbal, Saleem
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 605 - 616
  • [7] Comparative Evaluation of Trust Mechanisms for Wireless Sensor Networks
    Vasilache, Razvan-Andrei
    Gavrila, Ioan-Claudiu
    Grigorescu, Alin-Ciprian
    Gheorghe, Laura
    2013 ROEDUNET INTERNATIONAL CONFERENCE (ROEDUNET): NETWORKING IN EDUCATION, 11TH EDITION, 2013,
  • [8] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    V. Ram Prabha
    P. Latha
    Wireless Personal Communications, 2017, 94 : 2549 - 2559
  • [9] Trust evaluation model with entropy-based weight assignment for malicious node's detection in wireless sensor networks
    Yin, Xueqiang
    Li, Shining
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (01)
  • [10] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    Prabha, V. Ram
    Latha, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2549 - 2559