Trust aware systems in Wireless Sensor Networks

被引:0
作者
Rani [1 ]
JayaKumar [2 ]
Divya [3 ]
机构
[1] Anna Univ, Madras, Tamil Nadu, India
[2] RMK Engn Coll, Madras, Tamil Nadu, India
[3] Sri Sai Ram Engn Coll, Madras, Tamil Nadu, India
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15) | 2015年
关键词
security; trust evaluation; wireless sensor network; SCHEME;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sensor network is an adaptable technology for perceiving environmental criterions and hence finds its pivotal role in a wide range of applications. The applications range from mission critical like military or patient monitoring systems to home surveillance systems where the network may be prone to security attacks. The network is vulnerable to attack as it may be deployed in hostile environments. In addition it may be exposed to attacks due to the inherent feature of not incorporating security mechanisms into the nodes. Hence additional programs for security may be added in the network. One such scheme is making the network a trust ware system. The trust computation serves as a powerful tool in the detection of unexpected node behaviour. In this paper we propose a trust mechanism to determine the trustworthiness of the sensor node. Most of the existing trust aware systems are centralised and suffer from single head failure. In this paper we propose a dynamic and decentralized system.
引用
收藏
页码:174 / 179
页数:6
相关论文
共 20 条
  • [1] [Anonymous], J SENSORS
  • [2] Anwar R.W., 2014, World Applied Sciences Journal, V30, P1224, DOI DOI 10.5829/IDOSI.WASJ.2014.30.10.334
  • [3] A Survey on Trust Management for Mobile Ad Hoc Networks
    Cho, Jin-Hee
    Swami, Ananthram
    Chen, Ing-Ray
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04): : 562 - 583
  • [4] An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications
    Duan, Junqi
    Gao, Deyun
    Yang, Dong
    Foh, Chuan Heng
    Chen, Hsiao-Hwa
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (01): : 58 - 69
  • [5] Getsy S., 2010, INT J WIRELESS MOBIL, V2, P106
  • [6] Idris M., 2008, P S SIM SYST SEC SSS
  • [7] EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks
    Kumar, Dilip
    Aseri, Trilok C.
    Patel, R. B.
    [J]. COMPUTER COMMUNICATIONS, 2009, 32 (04) : 662 - 667
  • [8] Kumar M. Ramesh, 2012, INT J ADV RES COMPUT, V2, P200
  • [9] LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks
    Li, Xiaoyong
    Zhou, Feng
    Du, Junping
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) : 924 - 935
  • [10] Mitigating DoS attacks against broadcast authentication in wireless sensor networks
    Ning, Peng
    Liu, An
    Du, Wenliang
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (01)