Node-Level Trust Evaluation in Wireless Sensor Networks

被引:28
|
作者
Desai, S. Sundeep [1 ]
Nene, Manisha J. [1 ]
机构
[1] Def Inst Adv Technol, Dept Comp Sci & Engn, Pune 411025, Maharashtra, India
关键词
Security; trust; trust evaluation algorithms; cryptography; node-level security; node-memory integrity; AD HOC; MANAGEMENT; SECURITY; ATTACKS; SYSTEMS; SERVICE;
D O I
10.1109/TIFS.2019.2894027
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional cryptographic methods do not cater to the limitations of wireless sensor networks (WSNs) primarily concerning code size, processing time, and power consumption. The study in this paper enumerates the security primitives in WSNs and accentuates the strength of trust evaluation as a security solution within the WSN precincts. This paper proposes a trust evaluation methodology that evaluates a node-level trust by using an internal resource of a node. It is a completely mediating technique which is independent of network topology and second-hand information. The challenge response method enables a node to evaluate trust for itself; and with its peer-node/s with which it intends to interact using the proposed self-scrutiny and self-attestation algorithms, respectively. The efficacy of the proposed software-based methodology and the algorithms is demonstrated with the actual implementation on sensor nodes. The ability to counter attack-scenarios along with the analysis exhibits the merit of the proposed work. The average values of the observed results illustrate the consistency and robust performance of the proposed trust evaluation algorithms.
引用
收藏
页码:2139 / 2152
页数:14
相关论文
共 50 条
  • [11] CATM : Congestion aware trust model for wireless sensor networks
    Yadava, Rajit Ram
    Ranvijay
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (05) : 1475 - 1485
  • [12] An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks
    Ye, Zhengwang
    Wen, Tao
    Liu, Zhenyu
    Song, Xiaoying
    Fu, Chongguo
    JOURNAL OF SENSORS, 2017, 2017
  • [13] Trust evaluation method for clustered wireless sensor networks based on cloud model
    Zhang, Tong
    Yan, Lisha
    Yang, Yuan
    WIRELESS NETWORKS, 2018, 24 (03) : 777 - 797
  • [14] Distributed Node Authentication in Wireless Sensor Networks
    Zhang, Qiyuan
    Zhou, Xuehai
    Yang, Feng
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3361 - 3364
  • [15] Trust Model of Wireless Sensor Networks and Its Application in Data Fusion
    Chen, Zhenguo
    Tian, Liqin
    Lin, Chuang
    SENSORS, 2017, 17 (04)
  • [16] Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey
    Fang, Weidong
    Zhang, Wuxiong
    Chen, Wei
    Pan, Tao
    Ni, Yepeng
    Yang, Yinxuan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [17] Trust management in wireless sensor networks
    Zahariadis, Theodore
    Leligou, Helen C.
    Trakadas, Panagiotis
    Voliotis, Stamatis
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2010, 21 (04): : 386 - 395
  • [18] Node authentication algorithm for securing static wireless sensor networks from node clone attack
    Mohindru V.
    Singh Y.
    International Journal of Information and Computer Security, 2018, 10 (2-3) : 129 - 148
  • [19] A novel multiple-level trust management framework for wireless sensor networks
    Zhang, Bo
    Huang, Zhenhua
    Xiang, Yang
    COMPUTER NETWORKS, 2014, 72 : 45 - 61
  • [20] A Tow-Level Security Approach for Wireless Sensor Networks
    Hosseiny, Atefe
    Farzaneh, Nazbanoo
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2017, : 339 - 346