Node-Level Trust Evaluation in Wireless Sensor Networks

被引:28
|
作者
Desai, S. Sundeep [1 ]
Nene, Manisha J. [1 ]
机构
[1] Def Inst Adv Technol, Dept Comp Sci & Engn, Pune 411025, Maharashtra, India
关键词
Security; trust; trust evaluation algorithms; cryptography; node-level security; node-memory integrity; AD HOC; MANAGEMENT; SECURITY; ATTACKS; SYSTEMS; SERVICE;
D O I
10.1109/TIFS.2019.2894027
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional cryptographic methods do not cater to the limitations of wireless sensor networks (WSNs) primarily concerning code size, processing time, and power consumption. The study in this paper enumerates the security primitives in WSNs and accentuates the strength of trust evaluation as a security solution within the WSN precincts. This paper proposes a trust evaluation methodology that evaluates a node-level trust by using an internal resource of a node. It is a completely mediating technique which is independent of network topology and second-hand information. The challenge response method enables a node to evaluate trust for itself; and with its peer-node/s with which it intends to interact using the proposed self-scrutiny and self-attestation algorithms, respectively. The efficacy of the proposed software-based methodology and the algorithms is demonstrated with the actual implementation on sensor nodes. The ability to counter attack-scenarios along with the analysis exhibits the merit of the proposed work. The average values of the observed results illustrate the consistency and robust performance of the proposed trust evaluation algorithms.
引用
收藏
页码:2139 / 2152
页数:14
相关论文
共 50 条
  • [21] Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks
    Xueqiang Yin
    Shining Li
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [22] A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks
    Kim, Tai-Hoon
    Goyat, Rekha
    Rai, Mritunjay Kumar
    Kumar, Gulshan
    Buchanan, William J.
    Saha, Rahul
    Thomas, Reji
    IEEE ACCESS, 2019, 7 : 184133 - 184144
  • [23] A Secure Clustering Protocol With Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks
    Yang, Liu
    Lu, Yinzhi
    Yang, Simon X.
    Guo, Tan
    Liang, Zhifang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (07) : 4837 - 4847
  • [24] Design Guidelines on Trust Management for Underwater Wireless Sensor Networks
    Zhu, Rongxin
    Boukerche, Azzedine
    Long, Libo
    Yang, Qiuling
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (04): : 2547 - 2576
  • [25] Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    Yu, Yanli
    Li, Keqiu
    Zhou, Wanlei
    Li, Ping
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 867 - 880
  • [26] Collaborative Lightweight Trust Management Scheme for Wireless Sensor Networks
    Anita, X.
    Bhagyaveni, M. A.
    Manickam, J. Martin Leo
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (01) : 117 - 140
  • [27] Untraceability of Sensor Node Authentication in Wireless Sensor Networks
    Pathak, Ganesh R.
    Edake, Gaurish M.
    Patil, Suhas H.
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 893 - 897
  • [28] Trust Models in Wireless Sensor Networks and Online Social Networks: A Comparative Study
    Jiang, Wenjun
    Wu, Jie
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 612 - 617
  • [29] Sociopsychological trust model for Wireless Sensor Networks
    Rathore, Heena
    Badarla, Venkataramana
    George, K. J.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 62 : 75 - 87
  • [30] Trust aware systems in Wireless Sensor Networks
    Rani
    JayaKumar
    Divya
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 174 - 179